Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10339925 | Computer Networks | 2013 | 17 Pages |
Abstract
In addition to the theoretical approach, we have developed a software tool that implements the algorithms presented in this paper. Finally, as a proof of concept of our approach and tool we have applied the techniques to a real-life case study: the SIP protocol. In particular, the proposed techniques are applied to a set of real execution traces extracted from an IMS/SIP architecture.
Keywords
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Pramila Mouttappa, Stephane Maag, Ana Cavalli,