Sciweavers

203 search results - page 27 / 41
» On the Placement of Internet Instrumentation
Sort
View
CGO
2006
IEEE
14 years 3 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
GI
2009
Springer
14 years 2 months ago
Kampagne versus Dialog? NGOs, Web 2.0 und die Weiterentwicklung kommunikativer Strategien
: Die Ausweitung der Produktions- und Veröffentlichungsmöglichkeiten durch den einzelnen Internetnutzer haben eine strukturelle Weiterentwickelung des öffentlichen Kommunikation...
Ingmar Hagemann
CORR
2006
Springer
119views Education» more  CORR 2006»
13 years 10 months ago
Clustering and Sharing Incentives in BitTorrent Systems
Peer-to-peer protocols play an increasingly instrumental role in Internet content distribution. It is therefore important to gain a complete understanding of how these protocols b...
Arnaud Legout, Nikitas Liogkas, Eddie Kohler, Lixi...
MOBISYS
2006
ACM
14 years 9 months ago
Measurement driven deployment of a two-tier urban mesh access network
Multihop wireless mesh networks can provide Internet access over a wide area with minimal infrastructure expenditure. In this work, we present a measurement driven deployment stra...
Joseph Camp, Joshua Robinson, Christopher Steger, ...
INFOCOM
2006
IEEE
14 years 3 months ago
Intelligent Distribution of Intrusion Prevention Services on Programmable Routers
— The recent surge of new viruses and host attacks in the Internet and the tremendous propagation speed of selfdistributing attacks has made network security a pressing issue. To...
Andreas Hess, Hans-Florian Geerdes, Roland Wess&au...