Sciweavers

2673 search results - page 465 / 535
» Secure Communication: A New Application for Active Networks
Sort
View
SAC
2006
ACM
14 years 3 months ago
Proactive resilience through architectural hybridization
In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusiontolerant system under the asynchronous model. This result f...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
14 years 1 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
DSD
2006
IEEE
159views Hardware» more  DSD 2006»
14 years 3 months ago
Deadlock Free Routing Algorithms for Mesh Topology NoC Systems with Regions
Region concept helps to accommodate cores larger than the tile size in mesh topology NoC architectures. In addition, it offers many new opportunities for NoC design, as well as pr...
Rickard Holsmark, Maurizio Palesi, Shashi Kumar
GLOBECOM
2006
IEEE
14 years 3 months ago
Analysis of Peer-to-Peer SIP in a Distributed Mobile Middleware System
The seamless and flexible interconnection of the existing and emerging protocols and networks is essential to the success of the new generation mobile applications and services. Fo...
Erkki Harjula, Jussi Ala-Kurikka, Douglas Howie, M...
MOBICOM
2004
ACM
14 years 2 months ago
The changing usage of a mature campus-wide wireless network
Wireless Local Area Networks (WLANs) are now commonplace on many academic and corporate campuses. As “Wi-Fi” technology becomes ubiquitous, it is increasingly important to und...
Tristan Henderson, David Kotz, Ilya Abyzov