Sciweavers

8493 search results - page 162 / 1699
» Implementing a distributed firewall
Sort
View
144
Voted
CCS
2009
ACM
16 years 4 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
EUROPAR
2004
Springer
15 years 8 months ago
Exploiting Differentiated Tuple Distribution in Shared Data Spaces
The shared data space model has proven to be an effective paradigm for building distributed applications. However, building an efficient distributed implementation remains a chall...
Giovanni Russello, Michel R. V. Chaudron, Maarten ...
136
Voted
FMSD
2006
83views more  FMSD 2006»
15 years 3 months ago
A Framework for Modeling the Distributed Deployment of Synchronous Designs
Synchronous specifications are appealing in the design of large scale hardware and software systems because of their properties that facilitate verification and synthesis. When the...
Luca P. Carloni, Alberto L. Sangiovanni-Vincentell...
133
Voted
IEE
2007
104views more  IEE 2007»
15 years 3 months ago
Complete distributed garbage collection using DGC-consistent cuts and .NET AOP-support
: The memory management of distributed objects, when done manually, is an error-prone task. It leads to memory leaks and dangling references, causing applications to fail. Avoiding...
Luís Veiga, P. Pereira, Paulo Ferreira
111
Voted
COLCOM
2005
IEEE
15 years 9 months ago
Distributed floor control protocols for computer collaborative applications on overlay networks
— Computer supported collaborative applications on overlay networks are gaining popularity among users who are geographically dispersed. Examples of these kinds of applications i...
Shankar M. Banik, Sridhar Radhakrishnan, Tao Zheng...