Sciweavers

Share
COMCOM
2007
100views more  COMCOM 2007»
9 years 11 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia
SIGCOMM
2010
ACM
9 years 12 months ago
Energy proportionality of an enterprise network
Energy efficiency is becoming increasingly important in the operation of networking infrastructure, especially in enterprise and data center networks. While strategies for lowerin...
Priya Mahadevan, Sujata Banerjee, Puneet Sharma
CIA
2008
Springer
10 years 1 months ago
Filter Allocation Using Iterative ECNP
Network devices can filter traffic in order to protect end-user computers against network worms and other threats. Since these devices have very limited memories and cannot deploy ...
Jan Tozicka, Stepán Urban, Magdalena Prokop...
DSOM
1999
Springer
10 years 4 months ago
A Framework for the Integration of Legacy Devices into a Jini Management Federation
The administration of heterogeneous networks with many devices is a tedious and time-consuming task. Today’s approaches only provide static configuration files and make the add...
Gerd Aschemann, Svetlana Domnitcheva, Peer Hasselm...
IPPS
2005
IEEE
10 years 5 months ago
A Performance Comparison of Tree and Ring Topologies in Distributed Systems
A distributed system is a collection of computers that are connected via a communication network. Distributed systems have become commonplace due to the wide availability of low-c...
Min Huang, Brett Bode
EDOC
2006
IEEE
10 years 5 months ago
Services and Networks management through embedded devices and SOA
In this paper we present an embedded device able to manage the remote boot of network nodes by means of Wake on LAN (WoL) through Internet and Wide Area Network, presenting it as ...
Virgilio Gilart-Iglesias, Francisco Maciá P...
books