Sciweavers

4288 search results - page 784 / 858
» Domesticating Computers and the Internet
Sort
View
ICNP
2006
IEEE
15 years 6 months ago
High Speed Pattern Matching for Network IDS/IPS
— The phenomenal growth of the Internet in the last decade and society’s increasing dependence on it has brought along, a flood of security attacks on the networking and compu...
Mansoor Alicherry, Muthusrinivasan Muthuprasanna, ...
IPPS
2006
IEEE
15 years 6 months ago
Battery-aware router scheduling in wireless mesh networks
Wireless mesh networks recently emerge as a flexible, low-cost and multipurpose networking platform with wired infrastructure connected to the Internet. A critical issue in mesh ...
Chi Ma, Zhenghao Zhang, Yuanyuan Yang
NDSS
2006
IEEE
15 years 6 months ago
Enterprise Security: A Community of Interest Based Approach
Enterprise networks today carry a range of mission critical communications. A successful worm attack within an enterprise network can be substantially more devastating to most com...
Patrick Drew McDaniel, Subhabrata Sen, Oliver Spat...
NDSS
2006
IEEE
15 years 6 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
ACMACE
2006
ACM
15 years 5 months ago
Wireless home entertainment center: reducing last hop delays for real-time applications
Future digital entertainment services available to home users will share several characteristics: i) they will be deployed and delivered through the Internet, ii) a single media c...
Claudio E. Palazzi, Giovanni Pau, Marco Roccetti, ...