Sciweavers

7329 search results - page 1410 / 1466
» Network Extractor Protocols
Sort
View
122
Voted
STOC
2005
ACM
135views Algorithms» more  STOC 2005»
16 years 3 months ago
On the bias of traceroute sampling: or, power-law degree distributions in regular graphs
Understanding the graph structure of the Internet is a crucial step for building accurate network models and designing efficient algorithms for Internet applications. Yet, obtaini...
Dimitris Achlioptas, Aaron Clauset, David Kempe, C...
EUROSYS
2010
ACM
16 years 13 days ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverâ€...
Vitaly Chipounov, George Candea
SENSYS
2009
ACM
15 years 10 months ago
Darjeeling, a feature-rich VM for the resource poor
The programming and retasking of sensor nodes could beneï¬t greatly from the use of a virtual machine (VM) since byte code is compact, can be loaded on demand, and interpreted on...
Niels Brouwers, Koen Langendoen, Peter Corke
CCS
2009
ACM
15 years 10 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...
GLOBECOM
2009
IEEE
15 years 10 months ago
PreDA: Predicate Routing for DTN Architectures over MANET
—We consider a Delay Tolerant Network (DTN) whose users (nodes) are connected by an underlying Mobile Ad hoc Network (MANET) substrate. Users can declaratively express high-level...
Flavio Esposito, Ibrahim Matta
« Prev « First page 1410 / 1466 Last » Next »