Sciweavers

1591 search results - page 11 / 319
» Associating network flows with user and application informat...
Sort
View
NSDI
2008
13 years 9 months ago
Securing Distributed Systems with Information Flow Control
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...
CCR
2006
136views more  CCR 2006»
13 years 7 months ago
Traffic classification on the fly
The early detection of applications associated with TCP flows is an essential step for network security and traffic engineering. The classic way to identify flows, i.e. looking at...
Laurent Bernaille, Renata Teixeira, Ismael Akodken...
ICDCS
1997
IEEE
13 years 11 months ago
Effect of Connection Rerouting on Application Performance in Mobile Networks
—The increasing deployment of wireless access technology, along with the emergence of high speed integrated service networks, such as ATM, promises to provide mobile users with u...
Partho Pratim Mishra, Mani B. Srivastava
IJMTM
2010
93views more  IJMTM 2010»
13 years 5 months ago
Application of PLM in higher education procurement
: Colleges and universities are moving away from the traditional focus on single exchange transactions and toward an emphasis on creating and maintaining longer-term buyer-supplier...
Michael Wisma, Cynthia L. Tomovic
SIGCOMM
2012
ACM
11 years 9 months ago
DeTail: reducing the flow completion time tail in datacenter networks
Web applications have now become so sophisticated that rendering a typical page may require hundreds of intra-datacenter flows. At the same time, web sites must meet strict page ...
David Zats, Tathagata Das, Prashanth Mohan, Dhruba...