Sciweavers

6110 search results - page 175 / 1222
» Graceful Network Operations
Sort
View
EURONGI
2004
Springer
15 years 10 months ago
Enabling Mobile Peer-to-Peer Networking
Abstract. In this paper we present a P2P file-sharing architecture optimized for mobile networks. We discuss the applicability of current P2P techniques for resource access and me...
Jens O. Oberender, Frank-Uwe Andersen, Hermann de ...
ACSAC
2000
IEEE
15 years 9 months ago
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux
Recent work has shown that conventional operating system audit trails are insufficient to detect low-level network attacks. Because audit trails are typically based upon system c...
Thomas E. Daniels, Eugene H. Spafford
ANCS
2007
ACM
15 years 8 months ago
Frame shared memory: line-rate networking on commodity hardware
Network processors provide an economical programmable platform to handle the high throughput and frame rates of modern and next-generation communication systems. However, these pl...
John Giacomoni, John K. Bennett, Antonio Carzaniga...
LISA
2007
15 years 6 months ago
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems
We present an architecture1 designed for alert verification (i.e., to reduce false positives) in network intrusion-detection systems. Our technique is based on a systematic (and a...
Damiano Bolzoni, Bruno Crispo, Sandro Etalle
USENIX
2003
15 years 5 months ago
X Window System Network Performance
Performance was an important issue in the development of X from the initial protocol design and continues to be important in modern application and extension development. That X i...
Keith Packard, James Gettys