Sciweavers

828 search results - page 36 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
112
Voted
IPPS
2007
IEEE
15 years 8 months ago
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection
Since current internet threats contain not only malicious codes like Trojan or worms, but also spyware and adware which do not have explicit illegal content, it is necessary to hav...
Like Zhang, Gregory B. White
112
Voted
IPPS
2005
IEEE
15 years 8 months ago
Security Enhancement in InfiniBand Architecture
The InfiniBandTM Architecture (IBA) is a new promising I/O communication standard positioned for building clusters and System Area Networks (SANs). However, the IBA specification ...
Manhee Lee, Eun Jung Kim, Mazin S. Yousif
COMSWARE
2008
IEEE
15 years 9 months ago
Network coding for TCP throughput enhancement over a multi-hop wireless network
—The poor performance of TCP over multi-hop wireless networks is well known. In this paper we explore to what extent network coding can help to improve the throughput performance...
P. Samuel David, Anurag Kumar
109
Voted
DCOSS
2009
Springer
15 years 9 months ago
Online Coding for Reliable Data Transfer in Lossy Wireless Sensor Networks
Bulk transport underlies data exfiltration and code update facilities in WSNs, but existing approaches are not designed for highly lossy and variable-quality links. We observe tha...
Anthony D. Wood, John A. Stankovic
ICSE
2000
IEEE-ACM
15 years 6 months ago
Implementing incremental code migration with XML
We demonstrate how XML and related technologies can be used for code mobility at any granularity, thus overcoming the restrictions of existing approaches. By not fixing a particul...
Wolfgang Emmerich, Cecilia Mascolo, Anthony Finkel...