Sciweavers

3031 search results - page 40 / 607
» SNMS - Shadow Network Management System
Sort
View
SIGOPS
2008
170views more  SIGOPS 2008»
15 years 2 months ago
I/O resource management through system call scheduling
A principal challenge in operating system design is controlling system throughput and responsiveness while maximizing resource utilization. Unlike previous attempts in kernel reso...
Silviu S. Craciunas, Christoph M. Kirsch, Harald R...
ISCC
2008
IEEE
15 years 9 months ago
A sybilproof distributed identity management for P2P networks
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in ...
François Lesueur, Ludovic Mé, Val&ea...
143
Voted
MOBISYS
2008
ACM
16 years 2 months ago
Cascadia: a system for specifying, detecting, and managing rfid events
Cascadia is a system that provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw...
Evan Welbourne, Nodira Khoussainova, Julie Letchne...
140
Voted
JSAC
2011
126views more  JSAC 2011»
14 years 10 months ago
Spectrum Management in Multiuser Cognitive Wireless Networks: Optimality and Algorithm
Abstract— Spectrum management is used to improve performance in multiuser communication system, e.g., cognitive radio or femtocell networks, where multiuser interference can lead...
Chee Wei Tan, S. Friedland, Steven H. Low
120
Voted
DSOM
2007
Springer
15 years 9 months ago
Botnets for Scalable Management
With an increasing number of devices that must be managed, the scalability of network and service management is a real challenge. A similar challenge seems to be solved by botnets ...
Jérôme François, Radu State, O...