Sciweavers

10396 search results - page 1788 / 2080
» Deployment Support Network
Sort
View
SIGCOMM
1995
ACM
15 years 8 months ago
Two Issues in Reservation Establishment
This paper addresses two issues related to resource reservation establishment in packet switched networks o ering realtime services. The rst issue arises out of the natural tensi...
Scott Shenker, Lee Breslau
SIGCOMM
1995
ACM
15 years 8 months ago
Performance Analysis of MD5
MD5 is an authentication algorithm proposed as the required implementation of the authentication option in IPv6. This paper presents an analysis of the speed at which MD5 can be i...
Joseph D. Touch
102
Voted
NSDI
2007
15 years 6 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
149
Voted
MOBISYS
2008
ACM
15 years 6 months ago
Transient customization of mobile computing infrastructure
Kimberley enables rapid software provisioning of fixed infrastructure for transient use by a mobile device. It uses virtual machine (VM) technology, but avoids the performance cha...
Adam Wolbach, Jan Harkes, Srinivas Chellappa, Maha...
MOBISYS
2008
ACM
15 years 6 months ago
Chameleon: a capability adaptation system for interface virtualization
As computing capabilities of embedded devices increase, services such as Internet and multimedia are comportably supported by such devices. Users may demand for migrating services...
Sang-Bum Suh, Xiang Song, Jatin Kumar, Dushmanta M...
« Prev « First page 1788 / 2080 Last » Next »