Sciweavers

492 search results - page 65 / 99
» Performance Monitoring on Networked Virtual Environments
Sort
View
SECPERU
2006
IEEE
14 years 3 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
ICDCS
2008
IEEE
14 years 3 months ago
Securing Wireless Data Networks against Eavesdropping using Smart Antennas
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches ...
Sriram Lakshmanan, Cheng-Lin Tsao, Raghupathy Siva...
SAC
2010
ACM
14 years 3 months ago
A business driven cloud optimization architecture
In this paper, we discuss several facets of optimization in cloud computing, the corresponding challenges and propose an architecture for addressing those challenges. We consider ...
Marin Litoiu, C. Murray Woodside, Johnny Wong, Joa...
ASPLOS
2009
ACM
14 years 9 months ago
TwinDrivers: semi-automatic derivation of fast and safe hypervisor network drivers from guest OS drivers
In a virtualized environment, device drivers are often run inside a virtual machine (VM) rather than in the hypervisor, for reasons of safety and reduction in software engineering...
Aravind Menon, Simon Schubert, Willy Zwaenepoel
ICC
2007
IEEE
153views Communications» more  ICC 2007»
14 years 3 months ago
Interplay Between Routing and Distributed Source Coding in Wireless Sensor Network
—Recent Advances in Distributed Source Coding (DSC) for mission-driven Wireless Sensor Networks (WSN) are related to the coding for multiple correlated sensors in applications su...
Honggang Wang, Dongming Peng, Wei Wang 0015, Hamid...