Sciweavers

3814 search results - page 747 / 763
» Operating system support for multimedia systems
Sort
View
MINENET
2006
ACM
15 years 5 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
MOBICOM
2006
ACM
15 years 5 months ago
A coordinate-based approach for exploiting temporal-spatial diversity in wireless mesh networks
In this paper, we consider the problem of mitigating interference and improving network capacity in wireless mesh networks from the angle of temporal-spatial diversity. In a nutsh...
Hyuk Lim, Chaegwon Lim, Jennifer C. Hou
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
15 years 5 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...
WIDM
2006
ACM
15 years 5 months ago
SRI: exploiting semantic information for effective query routing in a PDMS
The huge amount of data available from Internet information sources has focused much attention on the sharing of distributed information through Peer Data Management Systems (PDMS...
Federica Mandreoli, Riccardo Martoglia, Simona Sas...
MOBICOM
2005
ACM
15 years 5 months ago
GrooveSim: a topography-accurate simulator for geographic routing in vehicular networks
Vehicles equipped with wireless communication devices are poised to deliver vital services in the form of safety alerts, traffic congestion probing and on-road commercial applicat...
Rahul Mangharam, Daniel S. Weller, Daniel D. Stanc...