Sciweavers

430 search results - page 16 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
IWDC
2005
Springer
117views Communications» more  IWDC 2005»
14 years 1 months ago
Oasis: A Hierarchical EMST Based P2P Network
Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems and ...
Pankaj Ghanshani, Tarun Bansal
ACSAC
2010
IEEE
12 years 11 months ago
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same ne...
Baris Coskun, Sven Dietrich, Nasir D. Memon
USENIX
2008
13 years 10 months ago
A Multi-Site Virtual Cluster System for Wide Area Networks
A virtual cluster is a promising technology for reducing management costs and improving capacity utilization in datacenters and computer centers. However, recent cluster virtualiz...
Takahiro Hirofuchi, Takeshi Yokoi, Tadashi Ebara, ...
APWEB
2006
Springer
13 years 11 months ago
An Energy Efficient Cross-Layer MAC Protocol for Wireless Sensor Networks
In the area of wireless sensor networks, achieving minimum energy consumption is a very important research issue. A number of energy efficient protocols have been proposed, mostly ...
Changsu Suh, Young-Bae Ko, Dong-Min Son
ICPP
2000
IEEE
14 years 11 days ago
Multilayer VLSI Layout for Interconnection Networks
Current VLSI technology allows more than two wiring layers and the number is expected to rise in future. In this paper, we show that, by designing VLSI layouts directly for an L-l...
Chi-Hsiang Yeh, Emmanouel A. Varvarigos, Behrooz P...