Sciweavers

2503 search results - page 336 / 501
» Building Computer Network Attacks
Sort
View
DSN
2004
IEEE
15 years 5 months ago
Implementing Simple Replication Protocols using CORBA Portable Interceptors and Java Serialization
The goal of this paper is to assess the value of simple features that are widely available in off-the-shelf CORBA and Java platforms for the implementation of faulttolerance mecha...
Taha Bennani, Laurent Blain, Ludovic Courtè...
PERCOM
2010
ACM
15 years 2 days ago
WebPlug: A framework for the Web of Things
Abstract—We present WebPlug, a framework for the emerging Web of Things. It consists of several building blocks which ease integration of things, including their sensors and actu...
Benedikt Ostermaier, Fabian Schlup, Kay Römer
130
Voted
DSN
2011
IEEE
14 years 1 months ago
Coerced Cache Eviction and discreet mode journaling: Dealing with misbehaving disks
—We present Coerced Cache Eviction (CCE), a new method to force writes to disk in the presence of a disk cache that does not properly obey write-cache configuration or flush re...
Abhishek Rajimwale, Vijay Chidambaram, Deepak Rama...
NDSS
2009
IEEE
15 years 8 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
IPPS
2006
IEEE
15 years 7 months ago
A portable real-time emulator for testing multi-radio MANETs
In building a real-life mobile ad-hoc network (MANET), network emulation has been appraised as an efficient approach for testing the real implementations of routing algorithms and...
Weirong Jiang, Chao Zhang