Sciweavers

804 search results - page 41 / 161
» Specification and Analysis of Network Resource Requirements ...
Sort
View
PET
2007
Springer
14 years 2 months ago
Browser-Based Attacks on Tor
This paper describes a new attack on the anonymity of web browsing with Tor. The attack tricks a user’s web browser into sending a distinctive signal over the Tor network that ca...
Timothy G. Abbott, Katherine J. Lai, Michael R. Li...
ICDCS
2003
IEEE
14 years 2 months ago
SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks
In this paper, we present a real-time communication protocol for sensor networks, called SPEED. The protocol provides three types of real-time communication services, namely, real...
Tian He, John A. Stankovic, Chenyang Lu, Tarek F. ...
JEC
2006
113views more  JEC 2006»
13 years 8 months ago
CyNC: A method for real time analysis of systems with cyclic data flows
The paper addresses a novel method for realtime analysis of systems with cyclic data flows. The presented method is based on Network Calculus principles, where upper and lower flo...
Henrik Schiøler, Jens Dalsgaard Nielsen, Ki...
ICDCSW
2009
IEEE
14 years 3 months ago
Embedded Virtual Machines for Robust Wireless Control Systems
Embedded wireless networks have largely focused on openloop sensing and monitoring. To address actuation in closedloop wireless control systems there is a strong need to re-think ...
Rahul Mangharam, Miroslav Pajic
OSDI
2002
ACM
14 years 9 months ago
Resource Overbooking and Application Profiling in Shared Hosting Platforms
In this paper, we present techniques for provisioning CPU and network resources in shared hosting platforms running potentially antagonistic third-party applications. The primary ...
Bhuvan Urgaonkar, Prashant J. Shenoy, Timothy Rosc...