Sciweavers

AICT
2007
IEEE
149views Communications» more  AICT 2007»
13 years 11 months ago
The Google Muni Wifi Network--Can it Compete with Cellular Voice?
Muni WiFi deployments have been widely covered by the media during the last two years. However, the economical feasibility and performance of such deployments as an alternative fo...
Andres Arjona, Sami Takala
AICT
2008
IEEE
119views Communications» more  AICT 2008»
13 years 11 months ago
Simplification of Frequency Test for Random Number Generation Based on Chi-Square
This paper presents the simplified method of random test suite based on the frequency (block) test. The test is used to check the first property of random numbers which is to have ...
Kruawan Wongpanya, Keattisak Sripimanwat, Kanok Je...
CMS
2010
150views Communications» more  CMS 2010»
13 years 11 months ago
Throwing a MonkeyWrench into Web Attackers Plans
Abstract. Client-based attacks on internet users with malicious web pages represent a serious and rising threat. Internet Browsers with enabled active content technologies such as ...
Armin Büscher, Michael Meier, Ralf Benzmü...
CMS
2010
149views Communications» more  CMS 2010»
13 years 11 months ago
Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks
Abstract. Nowadays, Voice over Internet Protocol (VoIP) which enables voice conversation remotely over packet switched networks gains much attentions for its low costs and flexible...
Ge Zhang, Simone Fischer-Hübner
CMS
2010
207views Communications» more  CMS 2010»
13 years 11 months ago
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
While conventional malware detection approaches increasingly fail, modern heuristic strategies often perform dynamically, which is not possible in many applications due to related ...
Ronny Merkel, Tobias Hoppe, Christian Krätzer...
CMS
2010
118views Communications» more  CMS 2010»
13 years 11 months ago
SIP Proxies: New Reflectors in the Internet
To mitigate identity theft in SIP networks, an inter-domain authentication mechanism based on certificates is proposed in RFC 4474 [10]. Unfortunately, the design of the certificat...
Ge Zhang, Jordi Jaen Pallares, Yacine Rebahi, Simo...
SIGCOMM
2010
ACM
13 years 11 months ago
Topology-aware resource allocation for data-intensive workloads
This paper proposes an architecture for optimized resource allocation in Infrastructure-as-a-Service (IaaS)-based cloud systems. Current IaaS systems are usually unaware of the ho...
Gunho Lee, Niraj Tolia, Parthasarathy Ranganathan,...
SIGCOMM
2010
ACM
13 years 11 months ago
On-line consistent backup in transactional file systems
A consistent backup, preserving data integrity across files in a file system, is of utmost importance for the purpose of correctness and minimizing system downtime during the proc...
Lipika Deka, Gautam Barua
SIGCOMM
2010
ACM
13 years 11 months ago
Architecture optimisation with Currawong
We describe Currawong, a tool to perform system software architecture optimisation. Currawong is an extensible tool which applies optimisations at the point where an application i...
Nicholas Fitzroy-Dale, Ihor Kuz, Gernot Heiser