Sciweavers

1506 search results - page 105 / 302
» Application Deployment in Virtual Networks Using the X-Bone
Sort
View
CN
2007
179views more  CN 2007»
13 years 9 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
LCN
2002
IEEE
14 years 1 months ago
A User Level Framework for Ad Hoc Routing
The availability of inexpensive wireless networking hardware (e.g., based on the IEEE 802.11 standards) has generated interest in a large class of wireless applications. Many appl...
Jérémie Allard, Paul Gonin, Minoo Si...
INFOCOM
2003
IEEE
14 years 2 months ago
Exploring the trade-off between label size and stack depth in MPLS Routing
— Multiprotocol Label Switching or MPLS technology is being increasingly deployed by several of the largest Internet service providers to solve problems such as traffic engineer...
Anupam Gupta, Amit Kumar, Rajeev Rastogi
NETWORKING
2007
13 years 10 months ago
On-Line Predictive Load Shedding for Network Monitoring
Building robust network monitoring applications is hard given the unpredictable nature of network traffic. Complex analysis on streaming network data usually leads to overload situ...
Pere Barlet-Ros, Diego Amores-López, Gianlu...
ISM
2005
IEEE
109views Multimedia» more  ISM 2005»
14 years 2 months ago
Advances in X3D multi-user virtual environments
This paper presents the current state of the art in web3d multi-user technologies and more specifically networked virtual environment platforms that support the X3D standard, whic...
Christos Bouras, Alexandros Panagopoulos, Thrasyvo...