Sciweavers

3899 search results - page 735 / 780
» Argumentation for Access Control
Sort
View
INFOCOM
2006
IEEE
14 years 1 months ago
ISP and Egress Path Selection for Multihomed Networks
— Multihoming has been used by stub networks for several years as a form of redundancy, improving the availability of Internet access. More recently, Intelligent Route Control (I...
Amogh Dhamdhere, Constantinos Dovrolis
IPCCC
2006
IEEE
14 years 1 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
ISCC
2006
IEEE
190views Communications» more  ISCC 2006»
14 years 1 months ago
Time-Critical Underwater Sensor Diffusion with No Proactive Exchanges and Negligible Reactive Floods
— In this paper we study multi-hop ad hoc routing in a scalable Underwater Sensor Network (UWSN), which is a novel network paradigm for ad hoc investigation of the world below th...
Uichin Lee, Jiejun Kong, Joon-Sang Park, Eugenio M...
LCN
2006
IEEE
14 years 1 months ago
Exploiting Rate Diversity for Multicasting in Multi-Radio Wireless Mesh Networks
: A multi-rate capable IEEE 802.11a/b/g node can utilize different link-layer transmission rates. Interestingly, multi-rate capability is defined by IEEE 802.11 standards only for...
Junaid Qadir, Chun Tung Chou, Archan Misra
MICRO
2006
IEEE
145views Hardware» more  MICRO 2006»
14 years 1 months ago
ASR: Adaptive Selective Replication for CMP Caches
The large working sets of commercial and scientific workloads stress the L2 caches of Chip Multiprocessors (CMPs). Some CMPs use a shared L2 cache to maximize the on-chip cache c...
Bradford M. Beckmann, Michael R. Marty, David A. W...