Sciweavers

3296 search results - page 582 / 660
» Gathercast with Active Networks
Sort
View
PERCOM
2004
ACM
14 years 10 months ago
PrudentExposure: A Private and User-centric Service Discovery Protocol
: Service Discovery as an essential element in pervasive computing environments is widely accepted. Much active research on service discovery has been conducted, but privacy has be...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
SAC
2010
ACM
14 years 5 months ago
A business driven cloud optimization architecture
In this paper, we discuss several facets of optimization in cloud computing, the corresponding challenges and propose an architecture for addressing those challenges. We consider ...
Marin Litoiu, C. Murray Woodside, Johnny Wong, Joa...
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
14 years 5 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto
PAM
2010
Springer
14 years 5 months ago
Extracting Intra-domain Topology from mrinfo Probing
Active and passive measurements for topology discovery have known an impressive growth during the last decade. If a lot of work has been done regarding inter-domain topology discov...
Jean-Jacques Pansiot, Pascal Mérindol, Beno...
TMA
2010
Springer
199views Management» more  TMA 2010»
14 years 5 months ago
Mixing Biases: Structural Changes in the AS Topology Evolution
In this paper we study the structural evolution of the AS topology as inferred from two different datasets over a period of seven years. We use a variety of topological metrics to...
Hamed Haddadi, Damien Fay, Steve Uhlig, Andrew W. ...