Sciweavers

44 search results - page 7 / 9
» noms 2008
Sort
View
NOMS
2008
IEEE
14 years 5 months ago
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks
Abstract—System availability is difficult for systems to maintain in the face of Internet worms. Large systems have vulnerabilities, and if a system attempts to continue operati...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
NOMS
2008
IEEE
107views Communications» more  NOMS 2008»
14 years 5 months ago
A Framework for the establishment of inter-domain, on-demand VPNs
– Virtual Private Networks (VPNs) are a popular and cost-effective means to build wide-area corporate networks, since they provide bandwidth, privacy and security for a fraction ...
Alexandre Matos, Fernando Matos, Paulo Simõ...
NOMS
2008
IEEE
14 years 5 months ago
MANKOP: A Knowledge Plane for wireless ad hoc networks
— In mobile wireless ad hoc networks (MANETs), layering is frequently broken to cope with changes on the medium. Layering is also violated in order to implement autonomic behavio...
Daniel F. Macedo, Aldri L. dos Santos, Guy Pujolle...
NOMS
2008
IEEE
132views Communications» more  NOMS 2008»
14 years 5 months ago
Improving distributed service management using Service Modeling Language (SML)
—Automatic service and application deployment and management is becoming possible through the use of service and infrastructure discovery and policy systems. But using the infras...
Robert Adams, Ricardo Rivaldo, Guilherme Germoglio...
NOMS
2008
IEEE
14 years 5 months ago
On the multi-scale behavior of packet size distribution in Internet backbone network
—It is critical to adapt clear and representative real world traffic properties as groundwork for the contemporary and emergent future Internet workload generation. Byte count p...
Seongjin Lee, Youjip Won, Dong-Joon Shin