Sciweavers

283 search results - page 31 / 57
» OSPF Monitoring: Architecture, Design, and Deployment Experi...
Sort
View
81
Voted
ASPLOS
2006
ACM
15 years 6 months ago
Improving software security via runtime instruction-level taint checking
Current taint checking architectures monitor tainted data usage mainly with control transfer instructions. An alarm is raised once the program counter becomes tainted. However, su...
Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou
TMC
2008
159views more  TMC 2008»
14 years 11 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
IPSN
2007
Springer
15 years 6 months ago
Probabilistic detection of mobile targets in heterogeneous sensor networks
Target detection and field surveillance are among the most prominent applications of Sensor Networks (SN). The quality of detection achieved by a SN can be quantified by evaluat...
Loukas Lazos, Radha Poovendran, James A. Ritcey
IWQOS
2005
Springer
15 years 6 months ago
Analyzing Object Detection Quality Under Probabilistic Coverage in Sensor Networks
Abstract. Object detection quality and network lifetime are two conflicting aspects of a sensor network, but both are critical to many sensor applications such as military surveil...
Shansi Ren, Qun Li, Haining Wang, Xin Chen, Xiaodo...
94
Voted
SIGCOMM
2010
ACM
15 years 19 days ago
c-Through: part-time optics in data centers
Data-intensive applications that operate on large volumes of data have motivated a fresh look at the design of data center networks. The first wave of proposals focused on designi...
Guohui Wang, David G. Andersen, Michael Kaminsky, ...