Sciweavers

899 search results - page 9 / 180
» On Wiretap Networks II
Sort
View
HPCC
2005
Springer
14 years 1 months ago
Securing the MPLS Control Plane
— In an increasingly hostile environment, the need for security in network infrastructure is stronger than ever, especially for Multi-Protocol Label Switching (MPLS), widely used...
Francesco Palmieri, Ugo Fiore
CCR
2005
103views more  CCR 2005»
13 years 7 months ago
Part II: control theory for buffer sizing
This article describes how control theory has been used to address the question of how to size the buffers in core Internet routers. Control theory aims to predict whether the net...
Gaurav Raina, Donald F. Towsley, Damon Wischik
QRE
2011
12 years 10 months ago
Phase II monitoring of covariance stationary autocorrelated processes
papers/abstracts/authors within each session. • The Author and Session indices provide cross-reference assistance (pages 33-36). • The floor plan on page 6 shows you where tech...
Marcus B. Perry, Gary R. Mercado, Joseph J. Pignat...
ACSAC
2006
IEEE
14 years 1 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
DSD
2006
IEEE
98views Hardware» more  DSD 2006»
13 years 11 months ago
Profiling Bluetooth and Linux on the Xilinx Virtex II Pro
In this paper, we present profiling results of the Bluetooth standard implemented on the Xilinx Virtex II Pro device. The investigation is performed in two stages. First, we solel...
Filipa Duarte, Stephan Wong