Sciweavers

1709 search results - page 19 / 342
» An active network approach to virtual private networks
Sort
View
ICIP
2010
IEEE
14 years 11 months ago
Auction protocol for camera active control
In this paper, we apply the auction-based theories in economics to camera networks. We develop a set of auction protocols to do camera active control (pan/tilt/zoom) intelligently...
Yiming Li, Bir Bhanu, Wei Lin
106
Voted
ECOOPW
1999
Springer
15 years 6 months ago
Security in Active Networks
The desire for exible networking services has given rise to the concept of active networks." Active networks provide a general framework for designing and implementing network...
D. Scott Alexander, William A. Arbaugh, Angelos D....
OSDI
2006
ACM
16 years 2 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...
95
Voted
ICC
2009
IEEE
107views Communications» more  ICC 2009»
15 years 8 months ago
Towards a Denial-of-Service Resilient Design of Complex IPsec Overlays
— By monitoring the exchanged IPsec traffic an adversary can usually easily discover the layout of virtual private networks (VPNs). Of even worse extend is the disclosure if com...
Michael Brinkmeier, Michael Rossberg, Guenter Scha...
138
Voted
MOBISYS
2008
ACM
16 years 1 months ago
Flashproxy: transparently enabling rich web content via remote execution
It is now common for Web sites to use active Web content, such as Flash, Silverlight, or Java applets, to support rich, interactive applications. For many mobile devices, however,...
Alexander Moshchuk, Steven D. Gribble, Henry M. Le...