Sciweavers

1591 search results - page 2 / 319
» Associating network flows with user and application informat...
Sort
View
APNOMS
2006
Springer
13 years 9 months ago
Experiences in End-to-End Performance Monitoring on KOREN
As the network technology has been developed, the Next Generation Internet (NGI) such as Internet2, KOREN, KREONET2 and etc has been deployed to support bandwidth of Giga bps. And,...
Wang-Cheol Song, Deok-Jae Choi
MIDDLEWARE
2007
Springer
13 years 11 months ago
Dynamic multi-process information flow tracking for web application security
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh
INFOCOM
2007
IEEE
13 years 11 months ago
Dynamic Cross-Layer Association in 802.11-Based Mesh Networks
—In IEEE 802.11-based wireless mesh networks a user is associated with an access point (AP) in order to communicate and be part of the overall network. The association mechanism ...
George Athanasiou, Thanasis Korakis, Özgü...
WWW
2007
ACM
14 years 6 months ago
Information flow modeling based on diffusion rate for prediction and ranking
Information flows in a network where individuals influence each other. The diffusion rate captures how efficiently the information can diffuse among the users in the network. We p...
Xiaodan Song, Yun Chi, Koji Hino, Belle L. Tseng
OSDI
2006
ACM
14 years 5 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...