Sciweavers

3584 search results - page 110 / 717
» Design considerations for a network of information
Sort
View
MINENET
2006
ACM
15 years 3 months ago
How to extract BGP peering information from the internet routing registry
We describe an on-line service, and its underlying methodology, designed to extract BGP peerings from the Internet Routing Registry. Both the method and the service are based on: ...
Giuseppe Di Battista, Tiziana Refice, Massimo Rimo...
IFIP
2007
Springer
15 years 4 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
DSN
2008
IEEE
15 years 4 months ago
TCP covert timing channels: Design and detection
Exploiting packets’ timing information for covert communication in the Internet has been explored by several network timing channels and watermarking schemes. Several of them em...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
PERCOM
2003
ACM
15 years 9 months ago
System Design of Smart Table
This paper describes the system design of Smart Table, a table that can track and identify multiple objects simultaneously when placed on top of its surface. The table has been de...
Philipp Steurer, Mani B. Srivastava
CONEXT
2007
ACM
15 years 1 months ago
Folksonomy-based reasoning in opportunistic networks
Disparate algorithms are being designed to decide certain basic questions in opportunistic networks. This position paper describes a nascent idea that aims to provide a single fra...
Nishanth R. Sastry