Sciweavers

364 search results - page 35 / 73
» Monitoring, Analyzing, and Controlling Internet-scale System...
Sort
View
MOBISYS
2011
ACM
14 years 2 months ago
ProxiMate: proximity-based secure pairing using ambient wireless signals
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wire...
Suhas Mathur, Robert C. Miller, Alexander Varshavs...
COMCOM
2004
149views more  COMCOM 2004»
14 years 11 months ago
Accelerating network security services with fast packet classification
To protect a network, secure network systems such as intrusion detection system (IDS) and firewall are often installed to control or monitor network traffic. These systems often i...
Shiuh-Pyng Shieh, Fu-Yuan Lee, Ya-Wen Lin
ICCCI
2010
Springer
14 years 10 months ago
Strategic Health Information Management and Forecast: The Birdwatching Approach
Abstract. To facilitate communication and the exchange of information between patients, nurses, lab technicians, health insurers, physicians, policy makers, and existing knowledge-...
Arash Shaban-Nejad, Volker Haarslev
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
15 years 6 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
VEE
2010
ACM
247views Virtualization» more  VEE 2010»
15 years 6 months ago
Capability wrangling made easy: debugging on a microkernel with valgrind
Not all operating systems are created equal. Contrasting traditional monolithic kernels, there is a class of systems called microkernels more prevalent in embedded systems like ce...
Aaron Pohle, Björn Döbel, Michael Roitzs...