Sciweavers

596 search results - page 29 / 120
» The Design and Implementation of a Kernel Monitoring System ...
Sort
View
DSN
2005
IEEE
14 years 2 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
ICMCS
2006
IEEE
92views Multimedia» more  ICMCS 2006»
14 years 2 months ago
A Case for Internet Streaming via Web Servers
Hosting Internet streaming services has its unique challenges. Aiming at making Internet streaming services be widely and easily adopted in practice, in this paper, we have design...
Songqing Chen, Bo Shen, Wai-tian Tan, Susie Wee, X...
USITS
2001
13 years 9 months ago
Alpine: A User-Level Infrastructure for Network Protocol Development
In traditional operating systems, modifying the network protocol code is a tedious and error-prone task, largely because the networking stack resides in the kernel. For this reaso...
David Ely, Stefan Savage, David Wetherall
JDCTA
2010
95views more  JDCTA 2010»
13 years 3 months ago
WebAccess Based Remote Graphic Surveillance System for Mechatronics
This study employed WebAccess software to construct a remote graphic surveillance system, which was developed differently from previous remote monitoring systems. Advantech WebAcc...
Wen-Jye Shyr, Chia-Ming Lin, Wei-Ting Chiang
CCR
2008
109views more  CCR 2008»
13 years 8 months ago
An independent H-TCP implementation under FreeBSD 7.0: description and observed behaviour
A key requirement for IETF recognition of new TCP algorithms is having an independent, interoperable implementation. This paper describes our BSD-licensed implementation of H-TCP ...
Grenville J. Armitage, Lawrence Stewart, Michael W...