Sciweavers

2747 search results - page 290 / 550
» Network externalities in software systems
Sort
View
WISEC
2010
ACM
14 years 5 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
SECON
2007
IEEE
14 years 4 months ago
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks
Abstract—While mechanisms exist to instantiate common security functionality such as confidentiality and integrity, little has been done to define a mechanism for identificati...
Damon McCoy, Douglas C. Sicker, Dirk Grunwald
CASES
2004
ACM
14 years 4 months ago
High-level power analysis for on-chip networks
As on-chip networks become prevalent in multiprocessor systemson-a-chip and multi-core processors, they will be an integral part of the design flow of such systems. With power in...
Noel Eisley, Li-Shiuan Peh
FASE
2008
Springer
14 years 12 days ago
Engineering Service Oriented Applications: From StPowla Processes to SRML Models
Service Oriented Computing is a paradigm for developing software systems as the composition of a number of services. Services are loosely coupled entities, can be dynamically publi...
Laura Bocchi, Stephen Gorton, Stephan Reiff-Margan...
ECIS
2000
13 years 12 months ago
Open Source Movements as a Model for Organizing
Open source software such as the operating system Linux has in a few years created much attention as an alternative way to develop and distribute software. Open source is to let an...
Jan Ljungberg