Sciweavers

412 search results - page 58 / 83
» Single-Sink Network Design with Vertex Connectivity Requirem...
Sort
View
SIGCOMM
2000
ACM
14 years 2 days ago
SmartBridge: A scalable bridge architecture
As the number of hosts attached to a network increases beyond what can be connected by a single local area network (LAN), forwarding packets between hosts on different LANs become...
Thomas L. Rodeheffer, Chandramohan A. Thekkath, Da...
WOTUG
2007
13 years 9 months ago
Integrating and Extending JCSP
This paper presents the extended and re-integrated JCSP library of CSP packages for Java. It integrates the differing advances made by Quickstone’s JCSP Network Edition and the â...
Peter H. Welch, Neil Brown, James Moores, Kevin Ch...
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 2 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...
DSN
2009
IEEE
14 years 2 months ago
Intrusion-tolerant self-healing devices for critical infrastructure protection
Critical infrastructures like the power grid are essentially physical processes controlled by electronic devices. In the last decades, these electronic devices started to be contr...
Paulo Sousa, Alysson Neves Bessani, Wagner Saback ...
WWW
2007
ACM
14 years 8 months ago
Long distance wireless mesh network planning: problem formulation and solution
Several research efforts as well as deployments have chosen IEEE 802.11 as a low-cost, long-distance access technology to bridge the digital divide. In this paper, we consider the...
Sayandeep Sen, Bhaskaran Raman