Sciweavers

347 search results - page 49 / 70
» Development of Threat Evaluation Tool for Distributed Networ...
Sort
View
MOBISYS
2005
ACM
14 years 7 months ago
An overlay MAC layer for 802.11 networks
The widespread availability of 802.11-based hardware has made it the premier choice of both researchers and practitioners for developing new wireless networks and applications. Ho...
Ananth Rao, Ion Stoica
VALUETOOLS
2006
ACM
141views Hardware» more  VALUETOOLS 2006»
14 years 1 months ago
A realistic simulation of internet-scale events
Internet-scale security incidents are becoming increasingly common, and the researchers need tools to replicate and study them in a controlled setting. Current network simulators,...
Songjie Wei, Jelena Mirkovic
IDMS
2001
Springer
145views Multimedia» more  IDMS 2001»
13 years 11 months ago
A Service Differentiation Scheme for the End-System
A number of research studies show that the operating system has a substantial influence on communication delay in distributed environments. Thus, in order to provide applications w...
Domenico Cotroneo, Massimo Ficco, Giorgio Ventre
GCC
2004
Springer
14 years 22 days ago
XML Based X.509 Authorization in CERNET Grid
: This paper presents an authorization solution for resource management and control developing as a part of the China Education and Research Network (CERNET) to perform fine-graine...
Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping R...
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
14 years 1 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...