Search Results - "Fecko, Mariusz"

Refine Results
  1. 1

    Distributed policy enforcement for priority awareness in tactical SATCOM networks by Sucec, John, Fecko, Mariusz A., Ong, Baron, Wei Liu, Doshi, Sheetal, Turck, Kurt

    “…This paper presents a working distributed SATCOM policy enforcement (SPE) software prototype that protects priority traffic in tactical SATCOM networks. The…”
    Get full text
    Conference Proceeding
  2. 2

    On stability analysis of virtual backbone in mobile ad hoc networks by Hökelek, İbrahim, Uyar, M. Ümit, Fecko, Mariusz A.

    Published in Wireless networks (01-02-2008)
    “…Service discovery architectures and cluster-assisted routing protocols in mobile ad-hoc networks (MANETs) heavily use formation and maintenance of a virtual…”
    Get full text
    Journal Article
  3. 3

    Scalable Registration and Discovery of Devices in Low-Bandwidth Tactical Networks by Demers, Stephanie, Fecko, Mariusz A., Yow-Jian Lin, Shur, David, Samtani, Sunil, Sinkar, Kaustubh, Chapin, John

    “…Management of RF Network and Tasking Infrastructure (MARTI) is a distributed system that discovers, tracks, coordinates, and manages the reception and…”
    Get full text
    Conference Proceeding
  4. 4

    Throughput models for SCTP with parallel subflows by Zou, Jianping, Uyar, M. Ümit, Fecko, Mariusz A., Samtani, Sunil

    “…Multi-streaming provides SCTP with an aggregation mechanism to accommodate heterogeneous objects, which belong to the same application but may require…”
    Get full text
    Journal Article
  5. 5

    ALE: Adaptive link establishment in OSPF wireless ad-hoc networks by Jaewon Kang, Fecko, Mariusz A, Samtani, S

    “…Link state routing protocols such as OSPF synchronize the topology databases by flooding link state update messages periodically or whenever there is a…”
    Get full text
    Conference Proceeding
  6. 6

    Performance evaluation of subflow capable SCTP by Zou, Jianping, Uyar, M. Ümit, Fecko, Mariusz A., Samtani, Sunil

    Published in Computer communications (04-08-2006)
    “…With its new features such as multi-homing, multi-streaming, and enhanced security, the Stream Control Transmission Protocol (SCTP) has become a promising…”
    Get full text
    Journal Article
  7. 7

    A technique to generate feasible tests for communications systems with multiple timers by Fecko, M.A., Uyar, M.U., Duale, A.Y., Amer, P.D.

    Published in IEEE/ACM transactions on networking (01-10-2003)
    “…We present a new model for testing real-time protocols with multiple timers, which captures complex timing dependencies by using simple linear expressions…”
    Get full text
    Journal Article
  8. 8

    XML-based requirements engineering for an electronic clearinghouse by Fecko, Mariusz A., Lott, Christopher M.

    Published in Information and software technology (01-10-2005)
    “…We present methods and tools to support XML-based requirements engineering for an electronic clearinghouse that connects trading partners in the…”
    Get full text
    Journal Article
  9. 9

    Experience in developing and testing network protocol software using FDTs by Ümit Uyar, M., Fecko, Mariusz A., Duale, Ali Y., Amer, Paul D., Sethi, Adarshpal S.

    Published in Information and software technology (15-09-2003)
    “…This paper presents the research effort to formally specify, develop and test a complex real-life protocol for mobile network radios (MIL-STD 188-220). As a…”
    Get full text
    Journal Article
  10. 10

    Testing protocols modeled as FSMs with timing parameters by Uyar, M.Ümit, Fecko, Mariusz A., Sethi, Adarshpal S., Amer, Paul D.

    “…An optimization method is introduced for generating minimum-length test sequences taking into account timing constraints for FSM models of communication…”
    Get full text
    Journal Article
  11. 11

    Preferential treatment of SCTP subflows: analysis and simulation by Jianping Zou, Uyar, M.U., Fecko, M.A., Samtani, S.

    “…The current SCTP specification is not aware of QoS provided by a network. As a result, it is unable to support preferential treatment of the individual…”
    Get full text
    Conference Proceeding
  12. 12

    Dynamic survivable resource pooling in mobile ad-hoc networks by Fecko, M.A., Kozat, U.C., Samtani, S., Uyar, M.U., Hokelek, I.

    “…The existing naming schemes for pooling resources are suitable only for static networks. We propose dynamic survivable resource pooling (DSRP) that provides a…”
    Get full text
    Conference Proceeding
  13. 13

    Mitigating control plane attacks on TDMA-based MAC protocols in mobile wireless networks by Jaewon Kang, Fecko, Mariusz, Manousakis, Kyriakos, Young, Kenneth

    “…The broadcast nature of mobile wireless networks makes these types of networks more vulnerable to attacks by compromised or malicious nodes in the neighborhood…”
    Get full text
    Conference Proceeding
  14. 14

    Conformance testing in systems with semicontrollable interfaces by Fecko, Mariusz A., Uyar, M.Ümit, Amer, Paul D., Sethi, Adarshpal S.

    Published in Annales des télécommunications (01-01-2000)
    “…In a conformance testing environment, an implementation under test (IUT) communicates with multiple entities. A tester may have differing degrees of control on…”
    Get full text
    Journal Article
  15. 15

    Mitigation of control plane attacks at the network layer by Fecko, Mariusz, Manousakis, Kyriakos, Young, Kenneth, Jaewon Kang, Pachulski, Andrew, Phoel, Wayne

    “…We describe the design, implementation and testing of the Component-Based Reusable Adaptive Mitigation (COBRAM) system, which is designed to mitigate attacks…”
    Get full text
    Conference Proceeding
  16. 16

    Throughput models for SCTP with parallel subilows by Zou, Jianping, Uyar, M Ümit, Fecko, Mariusz A, Samtani, Sunil

    “…Multi-streaming provides SCTP with an aggregation mechanism to accommodate heterogeneous objects, which belong to the same application but may require…”
    Get full text
    Journal Article
  17. 17

    Algorithms for Modeling a Class of Single Timing Faults in Communication Protocols by Uyar, M.U., Batth, S.S., Yu Wang, Fecko, M.A.

    Published in IEEE transactions on computers (01-02-2008)
    “…A set of graph augmentation algorithms is introduced to model a class of timing faults in timed-EFSM models. It is shown that the test sequences generated…”
    Get full text
    Journal Article
  18. 18

    Evaluation of architectures for reliable server pooling in wired and wireless environments by Uyar, M.U., Jianliang Zheng, Fecko, M.A., Samtani, S., Conrad, P.T.

    “…Reliable server pooling (RSP) allows a pool of redundant information sources to be viewed as a single transport endpoint and, therefore, it is able to provide…”
    Get full text
    Journal Article
  19. 19

    SISTO: A proposal for serverless information services for tactical operations by Shur, D., Samtani, S., Fecko, M., Manousakis, K., Kaul, V., Regli, W. C., Kopena, J.

    “…Lower echelon forces face significant barriers in utilizing increasingly available networked resources. Network access at the tactical edge continues to…”
    Get full text
    Conference Proceeding
  20. 20

    Distributed fault diagnostics for tactical networks by Cichocki, A, Mariusz, A F, Kadambe, S

    “…We present a design and an evaluation of a distributed fault diagnostic system (FDS) that copes with changing wireless network topology, complexity and size of…”
    Get full text
    Conference Proceeding