Sciweavers

2503 search results - page 258 / 501
» Building Computer Network Attacks
Sort
View
ACMSE
2007
ACM
15 years 6 months ago
CluVis: dual-domain visual exploration of cluster/network metadata
CluVis, a prototype for visual monitoring and exploration of cluster and network metadata, is introducted. CluVis builds upon interactively added charts of cluster/network metadat...
Christopher Waters, Jonathan Howell, T. J. Jankun-...
TRIDENTCOM
2005
IEEE
15 years 7 months ago
Addressing Repeatability in Wireless Experiments using ORBIT Testbed
With the rapid growth in research activity on future wireless networking applications and protocols, experimental study and validation is becoming an increasingly important tool t...
Sachin Ganu, Haris Kremo, Richard E. Howard, Ivan ...
ICDCS
2010
IEEE
15 years 5 months ago
LT Network Codes
This paper proposes LTNC, a new recoding algorithm to build low complexity network codes. At the core of LTNC is a decentralized version of LT codes that allows the use of fast be...
Mary-Luc Champel, Kévin Huguenin, Anne-Mari...
SAC
2008
ACM
15 years 1 months ago
Publish/subscribe architecture for mobile ad hoc networks
Publish/Subscribe architectures have been widely studied and applied in wired networks. However, their deployment on mobile ad hoc networks still presents a lot of challenges. Thi...
Cristiano G. Rezende, Bruno P. S. Rocha, Antonio A...
PERCOM
2006
ACM
16 years 1 months ago
Omero: Ubiquitous User Interfaces in the Plan B Operating System
It is difficult to build user interfaces that must be distributed over a set of dynamic and heterogeneous I/O devices. This difficulty increases when we want to split, merge, repl...
Francisco J. Ballesteros, Gorka Guardiola Muzquiz,...