Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Prototyping distributed embedded system can be seen as a collection of many requirements covering many domains. System designers and developers need to describe both functional and non-functional requirements. Building distributed systems is a very tedious task since the application has to be verifiable and analyzable. Architecture Analysis and Design Language (AADL) provides adequate syntax and semantics...
Through deeply analysis of INVITE flooding attack of SIP based VoIP system, a novel VoIP flooding detection scheme called CDVFD (Call Duration based VoIP Flooding Detection) is presented. The CDVFD method makes use of SIP signaling bidirectional interaction, and it can make fast detection using Chi-square value, and can distinguish from normal high VoIP traffic. Experimental results show the effectiveness...
Model-based testing helps test engineers automate their testing tasks so that they can be more cost-effective. When the model is changed due to the evolution of the specification, it is important to maintain the test suites up to date for regression testing. A complete regeneration of the whole test suite from the new model, although inefficient, is still frequently used in practice. To handle specification...
An extend vulnerability testing method for communication protocol is brought forward first, which is combined protocol Syntax analysis with Petri Net system. Then vulnerability testing of implementation of WAP protocol is made and the process is analyzed to prove the feasibility of the method.
In recent years, Internet Protocol (IP) telephony has been a real alternative to the traditional public switched telephone networks (PSTN). IP telephony offers more flexibility in the implementation of new features and services. The session initiation protocol (SIP) is becoming a popular signaling protocol for Voice over IP (VoIP) based applications. The SIP proxy server is a software application...
Model checking has for years been advertised as a way of ensuring the correctness of complex software systems. However, there exist surprisingly few critical studies of the application of model checking to industrial-scale software systems by people other than the model checker's own authors. In this paper we report our experience in applying the Spin model checker to the validation of the failover...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.