A cluster of PCs can be seen as a collection of networked low cost disks; such a collection can be operated by proper so as to provide the abstraction of a single, larger block de...
Alessandro Di Marco, Giovanni Chiola, Giuseppe Cia...
— This paper describes the design and implementation of a protocol scrubber, a transparent interposition mechanism for explicitly removing network attacks at both the transport a...
G. Robert Malan, David Watson, Farnam Jahanian, Pa...
Abstract: Social virtual worlds such as Second Life are digital representations of the real world where human-controlled avatars evolve and interact through social activities. Unde...
— Despite the great diversity of teleoperator designs and applications, their underlying control systems have many similarities. These similarities can be exploited to enable int...
Hawkeye H. I. King, Blake Hannaford, Ka-Wai Kwok, ...
—We propose a new multi-hop routing protocol for wireless sensor networks, suited for monitoring and control applications. The aim of this research is to adapt flat and hierarch...