Many emergent security threats which did not exist in the traditional telephony network are introduced in SIP VoIP services. To provide high-level security assurance to SIP VoIP s...
Abstract--Virtualization technology facilitates a dynamic, demanddriven allocation and migration of servers. This paper studies how the flexibility offered by network virtualizatio...
Dushyant Arora, Anja Feldmann, Gregor Schaffrath, ...
Abstract— Energy efficiency is a fundamental issue for outdoor sensor network systems. This paper presents the design and implementation of multi-dimensional power management st...
Tian He, Pascal Vicaire, Ting Yan, Qing Cao, Gang ...
Using off-the-shelf commodity workstations to build a cluster for parallel computing has become a common practice. In studying or designing a cluster of workstations one should ha...
This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastr...