Sciweavers

8080 search results - page 330 / 1616
» From Computer Networks to Agent Networks
Sort
View
BROADNETS
2005
IEEE
15 years 10 months ago
Multi layer rules based framework for vertical handoff
— Seamless interoperability between two dissimilar networks require handoff from one network to the other. Such handoffs are known as vertical handoffs. Vertical handoff introduc...
Abhijit Sur, Douglas C. Sicker
NSDI
2010
15 years 6 months ago
ElasticTree: Saving Energy in Data Center Networks
Networks are a shared resource connecting critical IT infrastructure, and the general practice is to always leave them on. Yet, meaningful energy savings can result from improving...
Brandon Heller, Srinivasan Seetharaman, Priya Maha...
AINA
2008
IEEE
15 years 6 months ago
Keep Passwords Away from Memory: Password Caching and Verification Using TPM
TPM is able to provide strong secure storage for sensitive data such as passwords. Although several commercial password managers have used TPM to cache passwords, they are not cap...
Hua Wang, Yao Guo, Xia Zhao, Xiangqun Chen
121
Voted
DSN
2007
IEEE
15 years 11 months ago
Protecting Cryptographic Keys from Memory Disclosure Attacks
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that ...
Keith Harrison, Shouhuai Xu
PERCOM
2010
ACM
15 years 8 months ago
Dead reckoning from the pocket - An experimental study
—Modern mobile phones enable absolute positioning based on GPS or WiFi. However, incremental positioning based on dead reckoning is an interesting source of complementary informa...
Ulrich Steinhoff, Bernt Schiele