Sciweavers

2407 search results - page 446 / 482
» Design considerations for network processor operating system...
Sort
View
124
Voted
ACSD
2003
IEEE
151views Hardware» more  ACSD 2003»
15 years 8 months ago
Communicating Transaction Processes
Message Sequence Charts (MSC) have been traditionally used to depict execution scenarios in the early stages of design cycle. MSCs portray inter-process ( inter-object) interactio...
Abhik Roychoudhury, P. S. Thiagarajan
122
Voted
IJNSEC
2007
125views more  IJNSEC 2007»
15 years 2 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
111
Voted
DSOM
2005
Springer
15 years 8 months ago
Utilization and SLO-Based Control for Dynamic Sizing of Resource Partitions
This paper deals with a shared server environment where the server is divided into a number of resource partitions and used to host multiple applications at the same time. In a cas...
Zhikui Wang, Xiaoyun Zhu, Sharad Singhal
142
Voted
CCS
2006
ACM
15 years 6 months ago
Optimizing BGP security by exploiting path stability
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has b...
Kevin R. B. Butler, Patrick McDaniel, William Aiel...
149
Voted
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
15 years 9 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov