Sciweavers

2747 search results - page 72 / 550
» Network externalities in software systems
Sort
View
ACSAC
2008
IEEE
13 years 11 months ago
Preventing Information Leaks through Shadow Executions
A concern about personal information confidentiality typically arises when any desktop application communicates to the external network, for example, to its producer's server...
Roberto Capizzi, Antonio Longo, V. N. Venkatakrish...
NETWORKING
2004
13 years 10 months ago
Self-Admission Control for IP Telephony Using Early Quality Estimation
Abstract. If quality of service could be provided at the transport or the application layer, then it might be deployed simply by software upgrades, instead of requiring a complete ...
Olof Hagsand, Ignacio Más Ivars, Ian Marsh,...
DSN
2000
IEEE
14 years 1 months ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur
ESAS
2005
Springer
14 years 2 months ago
Spontaneous Cooperation in Multi-domain Sensor Networks
Sensor networks are large scale networks consisting of several nodes and some base stations. The nodes are monitoring the environment and send their measurement data towards the ba...
Levente Buttyán, Tamás Holczer, P&ea...
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
14 years 3 months ago
Achieving 10 Gb/s using safe and transparent network interface virtualization
: © Achieving 10 Gb/s using Safe and Transparent Network Interface Virtualization Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turner, Alan L. Cox, Scott Rixner HP Laboratories H...
Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turn...