Sciweavers

3031 search results - page 53 / 607
» SNMS - Shadow Network Management System
Sort
View
100
Voted
HOTOS
2003
IEEE
15 years 8 months ago
Sensing User Intention and Context for Energy Management
Sensors are emerging as a key area of interest in operating systems research, with a main focus on sensor networks. Turning the relationship around, we propose the use of low-powe...
Angela B. Dalton, Carla Schlatter Ellis
138
Voted
ICNP
2000
IEEE
15 years 7 months ago
Dynamic Internet Overlay Deployment and Management Using the X-Bone
The X-Bone dynamically deploys and manages Internet overlays to reduce con®guration e€ort and increase network component sharing. The X-Bone discovers, con®gures, and monitors ...
Joseph D. Touch
127
Voted
IJNSEC
2010
120views more  IJNSEC 2010»
14 years 10 months ago
Secure Group Key Management Scheme for Multicast Networks
This paper proposes a scheme to provide security to dynamic multicast VoIP systems efficiently. Security is usually provided by encrypting the media packets sent from a user to ot...
R. Srinivasan, V. Vaidehi, R. Rajaraman, S. Kanaga...
152
Voted
RTAS
2010
IEEE
15 years 1 months ago
Physicalnet: A Generic Framework for Managing and Programming Across Pervasive Computing Networks
This paper describes the design and implementation of a pervasive computing framework, named Physicalnet. Essentially, Physicalnet is a generic paradigm for managing and programmi...
Pascal Vicaire, Zhiheng Xie, Enamul Hoque, John A....
IAW
2003
IEEE
15 years 8 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...