Sciweavers

350 search results - page 37 / 70
» Improving application security with data flow assertions
Sort
View
134
Voted
IM
2003
15 years 4 months ago
Khnum - A Scalable Rapid Application Deployment System for Dynamic Hosting Infrastructures
: In a dynamically scalable hosting infrastructure for e-business computing, servers need to be quickly allocated in order to satisfy a sudden demand for increased computing power ...
Alain Azagury, Germán S. Goldszmidt, Yair K...
119
Voted
IH
2005
Springer
15 years 8 months ago
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan K...
112
Voted
NETWORK
2008
106views more  NETWORK 2008»
15 years 2 months ago
Toward internet-wide multipath routing
The Internet would be more efficient and robust if routers could flexibly divide traffic over multiple paths. Often, having one or two extra paths is sufficient for customizing pa...
Jiayue He, Jennifer Rexford
124
Voted
EUROPAR
2004
Springer
15 years 6 months ago
Profiling Grid Data Transfer Protocols and Servers
The trend of data intensive grid applications has brought grid storage protocols and servers into focus. The objective of this study is to gain an understanding of how time is spen...
George Kola, Tevfik Kosar, Miron Livny
178
Voted
SECON
2010
IEEE
15 years 19 days ago
Transmission Scheduling for Routing Paths in Cognitive Radio Mesh Networks
Nodes in a cognitive radio mesh network may select from a set of available channels to use provided they do not interfere with primary users. This ability can improve overall netwo...
Brendan Mumey, Xia Zhao, Jian Tang, Richard S. Wol...