Sciweavers

2058 search results - page 318 / 412
» Concast: Design and Implementation of a New Network Service
Sort
View
CN
2007
137views more  CN 2007»
14 years 12 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
ICDCSW
2000
IEEE
15 years 4 months ago
Enabling Flexible QoS Support in the Object Request Broker COOL
Support of end-to-end Quality-of-Service (QoS) and ate high-level programming abstractions are two crucial factors for the development of future telecommunication services and dis...
Tom Kristensen, Thomas Plagemann
PERCOM
2007
ACM
15 years 11 months ago
Practical Exploitation of the Energy-Latency Tradeoff for Sensor Network Broadcast
As devices become more reliant on battery power, it is essential to design energy efficient protocols. While there is a vast amount of research into power save protocols for unicas...
Matthew J. Miller, Indranil Gupta
TMA
2010
Springer
212views Management» more  TMA 2010»
15 years 6 months ago
EmPath: Tool to Emulate Packet Transfer Characteristics in IP Network
The paper describes the EmPath tool that was designed to emulate packet transfer characteristics as delays and losses in IP network. The main innovation of this tool is its ability...
Jaroslaw Sliwinski, Andrzej Beben, Piotr Krawiec
CACM
2000
158views more  CACM 2000»
14 years 11 months ago
Wireless Integrated Network Sensors
Wireless Integrated Network Sensors (WINS) now provide a new monitoring and control capability for transportation, manufacturing, health care, environmental monitoring, and safety...
Gregory J. Pottie, William J. Kaiser