Sciweavers

537 search results - page 12 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
IPSN
2007
Springer
15 years 4 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava
CSREASAM
2006
14 years 12 months ago
Gibraltar: A Mobile Host-Based Intrusion Protection System
Although mobile devices are globally omnipresent, security developments for these devices have not kept pace with their technological advancements. Thus, mobile devices are increa...
Grant A. Jacoby, Thadeus Hickman, Stuart Warders, ...
ICC
2007
IEEE
123views Communications» more  ICC 2007»
15 years 4 months ago
A New ILP-Based p-Cycle Construction Algorithm without Candidate Cycle Enumeration
—The notion of p-cycle (Preconfigured Protection Cycle) allows capacity efficient schemes to be designed for fast span protection in WDM mesh networks. Conventional p-cycle const...
Bin Wu, Kwan Lawrence Yeung, King-Shan Lui, Shizho...
TELSYS
2011
212views Education» more  TELSYS 2011»
14 years 5 months ago
Survivability and reliability of a composite-star transport network with disconnected core switches
Abstract This paper deals with the design and dimensioning of a novel survivable optical network structure, called Petaweb, that can reach a total capacity of several Pb/s (1015 bi...
Stefano Secci, Brunilde Sansò
TON
2010
118views more  TON 2010»
14 years 8 months ago
ILP formulations for p-cycle design without candidate cycle enumeration
—The concept of p-cycle (preconfigured protection cycle) allows fast and efficient span protection in wavelength division multiplexing (WDM) mesh networks. To design p-cycles f...
Bin Wu, Kwan L. Yeung, Pin-Han Ho