Sciweavers

3069 search results - page 461 / 614
» Issues with the construct of quality
Sort
View
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 5 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
ICC
2007
IEEE
101views Communications» more  ICC 2007»
15 years 5 months ago
Predicting the Performance of Mobile Ad Hoc Networks Using Scaled-Down Replicas
—Experimentation with mobile ad hoc network testbeds is preferred to simulations for performing high fidelity testing. But, at the same time, realistic experimentation with larg...
Fragkiskos Papadopoulos, Konstantinos Psounis
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 5 months ago
Scalable Resilient Overlay Networks Using Destination-Guided Detouring
— Routing policies used in the Internet tend to be restrictive limiting communication between source-destination pairs to one route, when often better alternates exist. To avoid ...
Sameer Qazi, Tim Moors
ICC
2007
IEEE
133views Communications» more  ICC 2007»
15 years 5 months ago
An Energy-Aware Multi-Hop Tree Scatternet for Bluetooth Networks
Abstract— Bluetooth is an enabling technology used to construct personal area networks. Since Bluetooth devices are usually energy-constrained, a critical issue for Bluetooth net...
Yuanyuan Zhou, Muralidhar Medidi
ICCCN
2007
IEEE
15 years 5 months ago
A Performance Evaluation of Vertical Handoff Scheme between Mobile-WiMax and Cellular Networks
- In multi-access network environments, interworking technologies has become a very important issue these days. This interworking would deliver optimized services to users and also...
SeongSoo Park, Jaehwang Yu, JongTae Ihm