Sciweavers

2715 search results - page 504 / 543
» Network bucket testing
Sort
View
IPCCC
2006
IEEE
14 years 1 months ago
Connectionless port scan detection on the backbone
Considerable research has been done on detecting and blocking portscan activities that are typically conducted by infected hosts to discover other vulnerable hosts. However, the f...
Avinash Sridharan, Tao Ye, Supratik Bhattacharyya
TRIDENTCOM
2006
IEEE
14 years 1 months ago
The utility of perceptive communication between distant wireless nodes
CSMA-based MAC protocols require wireless nodes to share the transmission medium with other nodes that are within carriersensing (CS) range. Hence, operations that depend on and c...
Kimaya Sanzgiri, Ian D. Chakeres, Elizabeth M. Bel...
NDSS
2005
IEEE
14 years 1 months ago
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables users to “try out” new software (or configuration changes to existing soft...
Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan,...
SLIP
2005
ACM
14 years 1 months ago
Multilevel full-chip routing with testability and yield enhancement
We propose in this paper a multilevel full-chip routing algorithm that improves testability and diagnosability, manufacturability, and signal integrity for yield enhancement. Two ...
Katherine Shu-Min Li, Chung-Len Lee, Yao-Wen Chang...
JSSPP
2005
Springer
14 years 1 months ago
Wave Scheduler: Scheduling for Faster Turnaround Time in Peer-Based Desktop Grid Systems
The recent success of Internet-based computing projects, coupled with rapid developments in peer-to-peer systems, has stimulated interest in the notion of harvesting idle cycles u...
Dayi Zhou, Virginia Mary Lo