Sciweavers

584 search results - page 113 / 117
» Fundamental limitations in control over a communication chan...
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
IBMRD
2011
112views more  IBMRD 2011»
13 years 2 months ago
Sensor Andrew: Large-scale campus-wide sensing and actuation
—We present Sensor Andrew, a multi-disciplinary campus-wide scalable sensor network that is designed to host a wide range of sensor, actuator and low-power applications. The goal...
Anthony Rowe, Mario Berges, Gaurav Bhatia, Ethan G...
SIGCOMM
2006
ACM
14 years 1 months ago
MIRO: multi-path interdomain routing
The Internet consists of thousands of independent domains with different, and sometimes competing, business interests. However, the current interdomain routing protocol (BGP) limi...
Wen Xu, Jennifer Rexford
SIGCOMM
2004
ACM
14 years 1 months ago
A system for authenticated policy-compliant routing
Internet end users and ISPs alike have little control over how packets are routed outside of their own AS, restricting their ability to achieve levels of performance, reliability,...
Barath Raghavan, Alex C. Snoeren
CORR
2010
Springer
147views Education» more  CORR 2010»
13 years 4 months ago
RAFDA: A Policy-Aware Middleware Supporting the Flexible Separation of Application Logic from Distribution
Middleware technologies often limit the way in which object classes may be used in distributed applications due to the fixed distribution policies that they impose. These policies...
Scott M. Walker, Alan Dearle, Stuart J. Norcross, ...