Sciweavers

10396 search results - page 171 / 2080
» Deployment Support Network
Sort
View
INFOCOM
2003
IEEE
14 years 2 months ago
Integrity for Virtual Private Routed Networks
Abstract— The term Virtual Private Network (VPN) encompasses a wide array of diverse technologies and network architectures. All VPNs should provide users with the isolation and ...
Randy Bush, Timothy Griffin
ISCA
2010
IEEE
181views Hardware» more  ISCA 2010»
14 years 2 months ago
ColorSafe: architectural support for debugging and dynamically avoiding multi-variable atomicity violations
In this paper, we propose ColorSafe, an architecture that detects and dynamically avoids single- and multi-variable atomicity violation bugs. The key idea is to group related data...
Brandon Lucia, Luis Ceze, Karin Strauss
SOSP
2005
ACM
14 years 6 months ago
Implementing declarative overlays
Overlay networks are used today in a variety of distributed systems ranging from file-sharing and storage systems to communication infrastructures. However, designing, building a...
Boon Thau Loo, Tyson Condie, Joseph M. Hellerstein...
CCS
2005
ACM
14 years 3 months ago
Tracking anonymous peer-to-peer VoIP calls on the internet
Peer-to-peer VoIP calls are becoming increasingly popular due to their advantages in cost and convenience. When these calls are encrypted from end to end and anonymized by low lat...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
SENSYS
2010
ACM
13 years 7 months ago
Mapping the urban wireless landscape with Argos
Passive monitoring is an important tool for measuring, troubleshooting, and protecting modern wireless networks. To date, WiFi monitoring has focused primarily on indoor settings ...
Ian Rose, Matt Welsh