Sciweavers

2275 search results - page 281 / 455
» A Deployment System for Pervasive Computing
Sort
View
ICNP
2006
IEEE
15 years 10 months ago
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes
— The Internet’s interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks, which often arise from operator misconfiguration. Proposed solutions with st...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
ICWMC
2006
IEEE
15 years 10 months ago
A Coverage Analysis of Amplify-and-Forward Relaying Schemes in Outdoor Urban Environment
— The use of cellular systems enhanced by fixed relays has previously been proposed as a way to provide wide area coverage for high bit-rate at a reduced cost of the wireless ac...
Bogdan Timus
DSOM
2004
Springer
15 years 10 months ago
Using Object-Oriented Constraint Satisfaction for Automated Configuration Generation
In this paper, we describe an approach for automatically generating configurations for complex applications. Automated generation of system co nfigurations is required to allow lar...
Tim Hinrichs, Nathaniel Love, Charles J. Petrie, L...
SIGCOMM
2010
ACM
15 years 4 months ago
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes
IP traceback can be used to find the origin of anonymous traffic; however, Internet-scale IP traceback systems have not been deployed due to a need for cooperation between Interne...
Guang Yao, Jun Bi, Zijian Zhou
146
Voted
TCS
2008
15 years 4 months ago
Efficient corona training protocols for sensor networks
Phenomenal advances in nano-technology and packaging have made it possible to develop miniaturized low-power devices that integrate sensing, special-purpose computing, and wireles...
Alan A. Bertossi, Stephan Olariu, Maria Cristina P...