Sciweavers

2503 search results - page 226 / 501
» Building Computer Network Attacks
Sort
View
HPCA
2005
IEEE
15 years 8 months ago
Exploring the Design Space of Power-Aware Opto-Electronic Networked Systems
As microprocessors become increasingly interconnected, the power consumed by the interconnection network can no longer be ignored. Moreover, with demand for link bandwidth increas...
Xuning Chen, Li-Shiuan Peh, Gu-Yeon Wei, Yue-Kai H...
CCS
2004
ACM
15 years 8 months ago
IP covert timing channels: design and detection
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In...
Serdar Cabuk, Carla E. Brodley, Clay Shields
SIGCOMM
2010
ACM
15 years 3 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
USENIX
2004
15 years 4 months ago
A Network Positioning System for the Internet
Network positioning has recently been demonstrated to be a viable concept to represent the network distance relationships among Internet end hosts. Several subsequent studies have...
T. S. Eugene Ng, Hui Zhang
PERCOM
2009
ACM
15 years 10 months ago
An Infrastructure for Interactive and Playful Learning in Augmented Toy Environments
In this paper we describe our approach to realize a pervasive (computing) learning environment for children based on augmented toys: traditional toys that are equipped with pervas...
Steve Hinske, Marc Langheinrich