Sciweavers

1709 search results - page 284 / 342
» An active network approach to virtual private networks
Sort
View
PERCOM
2003
ACM
15 years 11 months ago
Providing Contextual Information to Pervasive Computing Applications
Pervasive computing applications are increasingly leveraging contextual information from several sources to provide users with behavior appropriate to the environment in which the...
Glenn Judd, Peter Steenkiste
EUROSYS
2006
ACM
15 years 9 months ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
ICNP
2006
IEEE
15 years 5 months ago
Scaling IP Routing with the Core Router-Integrated Overlay
— IP routing scalability is based on hierarchical routing, which requires that the IP address hierarchy be aligned with the physical topology. Both site multi-homing and switchin...
Xinyang Zhang, Paul Francis, Jia Wang, Kaoru Yoshi...
NETGAMES
2006
ACM
15 years 5 months ago
Load balancing for massively multiplayer online games
Supporting thousands, possibly hundreds of thousands, of players is a requirement that must be satisfied when delivering server based online gaming as a commercial concern. Such a...
Fengyun Lu, Simon E. Parkin, Graham Morgan
FORTE
2011
14 years 3 months ago
A Framework for Verifying Data-Centric Protocols
Abstract. Data centric languages, such as recursive rule based languages, have been proposed to program distributed applications over networks. They simplify greatly the code, whic...
Yuxin Deng, Stéphane Grumbach, Jean-Fran&cc...