Sciweavers

1017 search results - page 39 / 204
» Towards an Active Network Architecture
Sort
View
ISF
2008
114views more  ISF 2008»
13 years 10 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
MOBICOM
2009
ACM
14 years 4 months ago
Challenge: ultra-low-power energy-harvesting active networked tags (EnHANTs)
This paper presents the design challenges posed by a new class of ultra-low-power devices referred to as Energy-Harvesting Active Networked Tags (EnHANTs). EnHANTs are small, fle...
Maria Gorlatova, Peter R. Kinget, Ioannis Kymissis...
HPDC
2010
IEEE
13 years 11 months ago
BTWorld: towards observing the global BitTorrent file-sharing network
Today, the BitTorrent Peer-to-Peer file-sharing network is one of the largest Internet applications--it generates massive traffic volumes, it is deployed in thousands of independe...
Maciej Wojciechowski, Mihai Capotâ, Johan A....
INFOCOM
2007
IEEE
14 years 4 months ago
Small Active Counters
— The need for efficient counter architecture has arisen for the following two reasons. Firstly, a number of data streaming algorithms and network management applications requir...
Rade Stanojevic
MOBISYS
2008
ACM
14 years 10 months ago
Micro power management of active 802.11 interfaces
Wireless interfaces are major power consumers on mobile systems. Considerable research has improved the energy efficiency of elongated idle periods or created more elongated idle ...
Jiayang Liu, Lin Zhong