Sciweavers

417 search results - page 48 / 84
» Invisible Network: Concepts and Architecture
Sort
View
SAC
2004
ACM
14 years 1 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
DATE
2003
IEEE
97views Hardware» more  DATE 2003»
14 years 1 months ago
Enhancing Speedup in Network Processing Applications by Exploiting Instruction Reuse with Flow Aggregation
Instruction reuse is a microarchitectural technique that improves the execution time of a program by removing redundant computations at run-time. Although this is the job of an op...
G. Surendra, Subhasis Banerjee, S. K. Nandy
IPPS
2000
IEEE
14 years 2 days ago
ClusterNet: An Object-Oriented Cluster Network
Abstract. Parallel processing is based on utilizing a group of processors to efficiently solve large problems faster than is possible on a single processor. To accomplish this, the...
Raymond Hoare
SIGCSE
2008
ACM
189views Education» more  SIGCSE 2008»
13 years 7 months ago
Operational experience with a virtual networking laboratory
Virtual laboratories are a potential replacement for standard laboratory facilities. Use of these virtual resources can reduce cost and maintenance overheads for teaching institut...
Charlie Wiseman, Ken Wong, Tilman Wolf, Sergey Gor...
KES
2004
Springer
14 years 1 months ago
Supporting Smart Applications in Multihop Ad-Hoc Networks - The GecGo Middleware
The goal of the GecGo middleware is to provide all the services required by self-organizing distributed applications running on multihop ad-hoc networks. Because of the frequent as...
Peter Sturm, Hannes Frey, Daniel Görgen, Joha...