Sciweavers

2349 search results - page 291 / 470
» Performing time-sensitive network experiments
Sort
View
DSOM
2007
Springer
15 years 10 months ago
Virtualization-Based Techniques for Enabling Multi-tenant Management Tools
As service providers strive to improve the quality and efficiency of their IT (information technology) management services, the need to adopt a standard set of tools and processes...
Chang-Hao Tsai, Yaoping Ruan, Sambit Sahu, Anees S...
IPSN
2007
Springer
15 years 10 months ago
Active sensing platform for wireless structural health monitoring
This paper presents SHiMmer, a wireless platform for sensing and actuation that combines localized processing with energy harvesting to provide long-lived structural health monito...
D. Musiani, K. Lin, Tajana Simunic Rosing
SP
2006
IEEE
177views Security Privacy» more  SP 2006»
15 years 9 months ago
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis
Security concerns are becoming increasingly critical in networked systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are ...
Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, C...
ICDCSW
2005
IEEE
15 years 9 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani
INFOCOM
2005
IEEE
15 years 9 months ago
On the interaction between overlay routing and underlay routing
— In this paper, we study the interaction between overlay routing and Traffic Engineering (TE) in a single Autonomous System (AS). We formulate this interaction as a twoplayer n...
Yong Liu, Honggang Zhang, Weibo Gong, Donald F. To...