Sciweavers

2195 search results - page 192 / 439
» Prototyping Networked Embedded Systems
Sort
View
157
Voted
SIGCOMM
2012
ACM
13 years 5 months ago
Towards detecting BGP route hijacking using the RPKI
Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The s...
Matthias Wählisch, Olaf Maennel, Thomas C. Sc...
148
Voted
NOMS
2000
IEEE
176views Communications» more  NOMS 2000»
15 years 7 months ago
Design and analysis of a proactive application management system (PAMS)
Management of large-scale Network-Centric Systems (NCS) and their applications is an extremely complex and challenging task due to factors such as centralized management architect...
Salim Hariri, Yoonhee Kim
147
Voted
BROADNETS
2006
IEEE
15 years 9 months ago
Intra and Interdomain Circuit Provisioning Using the OSCARS Reservation System
— With the advent of service sensitive applications such as remote controlled experiments, time constrained massive data transfers, and video-conferencing, it has become apparent...
Chin Guok, David W. Robertson, Mary R. Thompson, J...
109
Voted
ICDCSW
2003
IEEE
15 years 8 months ago
Smart Furniture: Improvising Ubiquitous Hot-Spot Environment
We developed Smart Furniture, which extemporaneously converts the legacy non-smart space into a Smart Hot-spot which consists of computational services. Since the Smart Furniture ...
Masaki Ito, Akiko Iwaya, Masato Saito, Kenichi Nak...
DAC
2002
ACM
16 years 4 months ago
A fast on-chip profiler memory
Profiling an application executing on a microprocessor is part of the solution to numerous software and hardware optimization and design automation problems. Most current profilin...
Roman L. Lysecky, Susan Cotterell, Frank Vahid