Sciweavers

267 search results - page 11 / 54
» Credal Networks for Operational Risk Measurement and Managem...
Sort
View
PERCOM
2007
ACM
15 years 11 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
CCR
2008
113views more  CCR 2008»
14 years 11 months ago
Practical issues with using network tomography for fault diagnosis
This paper investigates the practical issues in applying network tomography to monitor failures. We outline an approach for selecting paths to monitor, detecting and confirming th...
Yiyi Huang, Nick Feamster, Renata Teixeira
96
Voted
ICESS
2005
Springer
15 years 5 months ago
AMT6: End-to-End Active Measurement Tool for IPv6 Network
Since IPv6 has more benefits over IPv4, the development and deployment of the IPv6 protocol-based products are currently taking place and the migration of IPv4 to IPv6 has also be...
Jahwan Koo, Seong-Jin Ahn
IMC
2004
ACM
15 years 5 months ago
Debugging DHCP performance
Dynamic Host Configuration Protocol (DHCP) was defined to facilitate automatic configuration of IP addresses and other network parameters to hosts in a network. Efficiency of D...
Vladimir Brik, Jesse Stroik, Suman Banerjee
IAJIT
2010
115views more  IAJIT 2010»
14 years 10 months ago
Measurement of V2oIP over wide area network between countries using soft phone and USB phone
: In this research, we propose an architectural solution to integrate the video voice over IP services in campus environment network and tested over LAN and WAN. Voice over IP tech...
Mohd Ismail