Sciweavers

20024 search results - page 3640 / 4005
» Database Management Systems
Sort
View
IWCMC
2009
ACM
15 years 11 months ago
WMNSec: security for wireless mesh networks
Wireless Mesh Networks (WMNs) are gaining popularity as a flexible and inexpensive replacement for Ethernet-based infrastructure. However, WMN security has not been covered adequ...
Georg Lukas, Christian Fackroth
IWCMC
2009
ACM
15 years 11 months ago
I-PMIP: an inter-domain mobility extension for proxy-mobile IP
Proxy Mobile IP (PMIP) provides a solution for networkbased localized mobility management which in contrast to host-based mobility solutions, like Mobile IP (MIP), does not requir...
Niklas Neumann, Jun Lei, Xiaoming Fu, Gong Zhang
JCDL
2009
ACM
162views Education» more  JCDL 2009»
15 years 11 months ago
No bull, no spin: a comparison of tags with other forms of user metadata
User-contributed tags have shown promise as a means of indexing multimedia collections by harnessing the combined efforts and enthusiasm of online communities. But tags are only o...
Catherine C. Marshall
SIGCOMM
2009
ACM
15 years 11 months ago
De-anonymizing the internet using unreliable IDs
Today’s Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. In this pa...
Yinglian Xie, Fang Yu, Martín Abadi
SIGCOMM
2009
ACM
15 years 11 months ago
Diverter: a new approach to networking within virtualized infrastructures
As virtualized data-centres become the back-end platforms behind a new generation of utility and cloud computing infrastructures (such as AmazonAWS [1]) their multi-tenancy, scale...
Aled Edwards, Anna Fischer, Antonio Lain
« Prev « First page 3640 / 4005 Last » Next »