Sciweavers

4998 search results - page 765 / 1000
» The case for intentional networking
Sort
View
DSN
2008
IEEE
14 years 3 months ago
Security through redundant data diversity
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...
ICMCS
2008
IEEE
194views Multimedia» more  ICMCS 2008»
14 years 3 months ago
Sparse FEC codes for flexible media protection
In this paper, we study block codes that are optimized to recover some lost source data even in case when full recovery is not possible. Conventionally, block codes designed for p...
Jari Korhonen, Pascal Frossard
NCA
2008
IEEE
14 years 3 months ago
Identifying Failures in Grids through Monitoring and Ranking
In this paper we present FailRank, a novel framework for integrating and ranking information sources that characterize failures in a grid system. After the failing sites have been...
Demetrios Zeinalipour-Yazti, Kyriakos Neocleous, C...
NOMS
2008
IEEE
14 years 3 months ago
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks
Abstract—System availability is difficult for systems to maintain in the face of Internet worms. Large systems have vulnerabilities, and if a system attempts to continue operati...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
SEUS
2008
IEEE
14 years 3 months ago
Resolving Performance Anomaly Using ARF-Aware TCP
In this study, we propose ARF-aware TCP that resolves the performance anomaly in 802.11 WLAN networks. Performance anomaly is a network symptom that fairness among the nodes is bro...
See-hwan Yoo, Tae-Kyung Kim, Chuck Yoo