Sciweavers

141 search results - page 19 / 29
» Intrusion Detection Routers: Design, Implementation and Eval...
Sort
View
NSDI
2008
13 years 9 months ago
Harnessing Exposed Terminals in Wireless Networks
This paper presents the design, implementation, and experimental evaluation of CMAP (Conflict Maps), a system that increases the number of successful concurrent transmissions in a...
Mythili Vutukuru, Kyle Jamieson, Hari Balakrishnan
WWW
2006
ACM
14 years 7 months ago
Wake-on-WLAN
In bridging the digital divide, two important criteria are cost-effectiveness, and power optimization. While 802.11 is cost-effective and is being used in several installations in...
Nilesh Mishra, Kameswari Chebrolu, Bhaskaran Raman...
ACSAC
2010
IEEE
13 years 4 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
NOSSDAV
2004
Springer
14 years 2 days ago
Scalable resilient media streaming
We present a low-overhead media streaming system, called SRMS (Scalable Resilient Media Streaming) that can be used to scalably deliver streaming data to a large group of receiver...
Suman Banerjee, Seungjoon Lee, Ryan Braud, Bobby B...
HPDC
2007
IEEE
14 years 1 months ago
Ridge: combining reliability and performance in open grid platforms
Large-scale donation-based distributed infrastructures need to cope with the inherent unreliability of participant nodes. A widely-used work scheduling technique in such environme...
Krishnaveni Budati, Jason D. Sonnek, Abhishek Chan...