Sciweavers

6689 search results - page 82 / 1338
» A Network Security Monitor
Sort
View
CCS
2008
ACM
13 years 11 months ago
CMV: automatic verification of complete mediation for java virtual machines
Runtime monitoring systems play an important role in system security, and verification efforts that ensure that these systems satisfy certain desirable security properties are gro...
A. Prasad Sistla, V. N. Venkatakrishnan, Michelle ...
COMSWARE
2007
IEEE
14 years 3 months ago
OASiS: A Programming Framework for Service-Oriented Sensor Networks
Abstract— Wireless sensor networks consist of small, inexpensive devices which interact with the environment, communicate with each other, and perform distributed computations in...
Manish Kushwaha, Isaac Amundson, Xenofon D. Koutso...
ALGOSENSORS
2010
Springer
13 years 7 months ago
Monitoring Churn in Wireless Networks
Wireless networks often experience a significant amount of churn, the arrival and departure of nodes. In this paper we propose a distributed algorithm for single-hop networks that...
Stephan Holzer, Yvonne Anne Pignolet, Jasmin Smula...
SIGCOMM
2009
ACM
14 years 3 months ago
Accountability in hosted virtual networks
Virtualization enables multiple networks, each customized for a particular purpose, to run concurrently over a shared substrate. One such model for managing these virtual networks...
Eric Keller, Ruby B. Lee, Jennifer Rexford
DSD
2008
IEEE
130views Hardware» more  DSD 2008»
14 years 3 months ago
On the Need for Passive Monitoring in Sensor Networks
—Debugging and analyzing Wireless Sensor Networks (WSNs) are important tasks for improving the quality and performance of the network. In this paper, Pimoto is to be presented, w...
Abdalkarim Awad, Rodrigo Nebel, Reinhard German, F...