Sciweavers

1377 search results - page 182 / 276
» Flit-Reservation Flow Control
Sort
View
147
Voted
SIGCOMM
2010
ACM
15 years 4 months ago
Towards software-friendly networks
There has usually been a clean separation between networks and the applications that use them. Applications send packets over a simple socket API; the network delivers them. Howev...
Kok-Kiong Yap, Te-Yuan Huang, Ben Dodson, Monica S...
DSONLINE
2006
79views more  DSONLINE 2006»
15 years 4 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
IJNM
2008
112views more  IJNM 2008»
15 years 4 months ago
How to avoid packet droppers with proactive routing protocols for ad hoc networks
Routing protocols for mobile ad hoc networks (MANETs) have been an active area of research for the last decade, with many very interesting potential as well as actual applications...
Ignacy Gawedzki, Khaldoun Al Agha
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
15 years 4 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
CN
1999
154views more  CN 1999»
15 years 4 months ago
Architectural Considerations in the Design of WDM-Based Optical Access Networks
We describe a WDM-based optical access network architecture for providing broadband Internet services. The architecture uses a passive collection and distribution network and a co...
Eytan Modiano, Richard A. Barry