Sciweavers

71 search results - page 9 / 15
» Performance Evaluation of Privacy-Preserving Policy Reconcil...
Sort
View
IMC
2006
ACM
14 years 1 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
SACMAT
2010
ACM
13 years 6 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
USENIX
2000
13 years 8 months ago
Pandora: A Flexible Network Monitoring Platform
This paper presents Pandora, a network monitoring platform that captures packets using purely passive techniques. Pandora addresses current needs for improving Internet middleware...
Simon Patarin, Mesaac Makpangou
HPCA
1995
IEEE
13 years 11 months ago
Software Cache Coherence for Large Scale Multiprocessors
Shared memory is an appealing abstraction for parallel programming. It must be implemented with caches in order toperform well, however, and caches require a coherence mechanism t...
Leonidas I. Kontothanassis, Michael L. Scott
ICDCN
2010
Springer
13 years 6 months ago
K-Directory Community: Reliable Service Discovery in MANET
Abstract. Service discovery in MANET suffers from frequent service unavailability due to failures of service providers or directory nodes. Ensuring network-wide service availabilit...
Vaskar Raychoudhury, Jiannong Cao, Weigang Wu, Yi ...