Sciweavers

6110 search results - page 148 / 1222
» Graceful Network Operations
Sort
View
INFOCOM
2012
IEEE
13 years 3 months ago
Characterizing geospatial dynamics of application usage in a 3G cellular data network
—Recent studies on cellular network measurement have provided the evidence that significant geospatial correlations, in terms of traffic volume and application access, exist in...
Muhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, J...
98
Voted
SIGCOMM
2009
ACM
15 years 7 months ago
Network virtualization: a view from the bottom
The interest in network virtualization has been growing steadily among the networking community in the last few years. Network virtualization opens up new possibilities for the ev...
Jorge Carapinha, Javier Jiménez
106
Voted
MSN
2007
Springer
187views Sensor Networks» more  MSN 2007»
15 years 7 months ago
Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks
Abstract. Multi-hop wireless networks provide a quick and easy way for networking when we need a temporary network or when cabling is difficult. The 802.11 Medium Access Control (M...
Lan Tien Nguyen, Razvan Beuran, Yoichi Shinoda
IAW
2003
IEEE
15 years 6 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
RAID
2010
Springer
14 years 10 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...