Sciweavers

1318 search results - page 191 / 264
» Measuring network security using dynamic bayesian network
Sort
View
IMC
2009
ACM
14 years 3 months ago
Triangle inequality variations in the internet
Triangle inequality violations (TIVs) are important for latency sensitive distributed applications. On one hand, they can expose opportunities to improve network routing by findi...
Cristian Lumezanu, Randolph Baden, Neil Spring, Bo...
NDSS
2009
IEEE
14 years 3 months ago
Recursive DNS Architectures and Vulnerability Implications
DNS implementers face numerous choices in architecting DNS resolvers, each with profound implications for security. Absent the use of DNSSEC, there are numerous interim techniques...
David Dagon, Manos Antonakakis, Kevin Day, Xiapu L...
ICDE
2007
IEEE
107views Database» more  ICDE 2007»
14 years 10 months ago
Many-to-Many Aggregation for Sensor Networks
Wireless sensor networks have enormous potential to aid data collection in a number of areas, such as environmental and wildlife research. In this paper, we address the challenges...
Adam Silberstein, Jun Yang 0001
CDC
2008
IEEE
140views Control Systems» more  CDC 2008»
14 years 3 months ago
Information state for Markov decision processes with network delays
We consider a networked control system, where each subsystem evolves as a Markov decision process (MDP). Each subsystem is coupled to its neighbors via communication links over wh...
Sachin Adlakha, Sanjay Lall, Andrea J. Goldsmith
EUROSYS
2007
ACM
14 years 6 months ago
Antiquity: exploiting a secure log for wide-area distributed storage
Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all serve...
Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Ch...