Sciweavers

96 search results - page 9 / 20
» Operational experience with a virtual networking laboratory
Sort
View
SOSP
2007
ACM
15 years 6 months ago
DejaView: a personal virtual computer recorder
As users interact with the world and their peers through their computers, it is becoming important to archive and later search the information that they have viewed. We present De...
Oren Laadan, Ricardo A. Baratto, Dan B. Phung, Sha...
MOBISYS
2011
ACM
14 years 18 days ago
Odessa: enabling interactive perception applications on mobile devices
Resource constrained mobile devices need to leverage computation on nearby servers to run responsive applications that recognize objects, people, or gestures from real-time video....
Moo-Ryong Ra, Anmol Sheth, Lily B. Mummert, Padman...
DASC
2006
IEEE
15 years 3 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
ADT
2011
14 years 1 months ago
Virtual networks: isolation, performance, and trends
Currently, there is a strong effort of the research community in rethinking the Internet architecture to cope with its current limitations and support new requirements. Many resea...
Natalia Castro Fernandes, Marcelo D. D. Moreira, I...
NETWORK
2010
92views more  NETWORK 2010»
14 years 4 months ago
On the use of RTP for monitoring and fault isolation in IPTV
Since the first operational IPTV networks have been deployed, service providers and operators have struggled to make their subscribers happy and satisfied with their services. To ...
Ali C. Begen, Colin Perkins, Jörg Ott