Sciweavers

534 search results - page 49 / 107
» Aggregating and Deploying Network Access Control Policies
Sort
View
SAC
2000
ACM
15 years 4 months ago
Making Tuple Spaces Safe for Heterogeneous Distributed Systems
Linda is a high level communication model which allows agents to communicate via a shared tuple spaces without knowing each other’s identities and without having to arrange for ...
Naftaly H. Minsky, Yaron Minsky, Victoria Ungurean...
CONEXT
2009
ACM
15 years 28 days ago
Detecting network neutrality violations with causal inference
We present NANO, a system that detects when ISPs apply policies that discriminate against specific classes of applications, users, or destinations. Existing systems for detecting ...
Muhammad Mukarram Bin Tariq, Murtaza Motiwala, Nic...
CCS
2008
ACM
15 years 1 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
ICDCSW
2003
IEEE
15 years 5 months ago
Adaptive Power Control and Selective Radio Activation for Low-Power Infrastructure-Mode 802.11 LANs
We present an integrated dual approach to reduce power consumption in infrastructure-mode 802.11 wireless LANs. A novel distributed power control algorithm adaptively adjusts the ...
Anmol Sheth, Richard Han
CN
2000
144views more  CN 2000»
14 years 11 months ago
ATM over ADSL probe in Telecom Italia environment
: This paper covers access network performance analysis by deploying ATM over ADSL within Telecom Italia experimental department "EXANET" (Experimental ATM Network). In t...
Stanislav Milanovic, Alessandro Maglianella