Sciweavers

2747 search results - page 39 / 550
» Network externalities in software systems
Sort
View
CODES
2006
IEEE
14 years 2 months ago
Creation and utilization of a virtual platform for embedded software optimization: : an industrial case study
Virtual platform (ViP), or ESL (Electronic System Level) simulation model, is one of the most widely renowned system level design techniques. In this paper, we present a case stud...
Sungpack Hong, Sungjoo Yoo, Sheayun Lee, Sangwoo L...
ACSAC
2008
IEEE
14 years 3 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
INFOCOM
2007
IEEE
14 years 3 months ago
EnviroStore: A Cooperative Storage System for Disconnected Operation in Sensor Networks
— This paper presents a new cooperative storage system for sensor networks geared for disconnected operation (where sensor nodes do not have a connected path to a basestation). T...
Liqian Luo, Chengdu Huang, Tarek F. Abdelzaher, Ja...
MOBICOM
2006
ACM
14 years 2 months ago
A software architecture for physical layer wireless network emulation
Despite their widespread deployment, many aspects of wireless network performance are poorly understood, and there is great room from improvement in wireless network reliability a...
Glenn Judd, Peter Steenkiste
RAID
2007
Springer
14 years 2 months ago
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Xuxian Jiang, Xinyuan Wang