Sciweavers

3031 search results - page 89 / 607
» SNMS - Shadow Network Management System
Sort
View
137
Voted
SAINT
2008
IEEE
15 years 10 months ago
Accuracy-Based Cache Consistency Management for Numerical Object Replication
Object replication and cache consistency have been one of major design issues in the recent Internet applications. In this paper, we forcus on accuracy-aware applications (i.e., s...
Hideya Ochiai, Hiroshi Esaki
102
Voted
HOTOS
2009
IEEE
15 years 7 months ago
Peloton: Coordinated Resource Management for Sensor Networks
This paper makes the case that operating system designs for sensor networks should focus on the coordination of resource management decisions across the network, rather than merel...
Jason Waterman, Geoffrey Werner Challen, Matt Wels...
118
Voted
USENIX
1993
15 years 4 months ago
Fremont: A System for Discovering Network Characteristics and Problems
In this paper we present an architecture and prototype implementation for discovering key network characteristics, such as hosts, gateways, and topology. The Fremont system uses a...
David C. M. Wood, Sean S. Coleman, Michael F. Schw...
111
Voted
LCN
2007
IEEE
15 years 10 months ago
Lightpath Reconfiguration in Regional IP-over-WDM Networks by a Centralized Control System
—Lightpath reconfiguration performance has been evaluated experimentally for regional IP-over-WDM network applications, making the network scalable and stable when traffic change...
Yutaka Katsuyama, Michio Hashimoto, Keiji Nishikaw...
113
Voted
IWIA
2006
IEEE
15 years 9 months ago
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System
We present POSEIDON, a new anomaly-based network intrusion detection system. POSEIDON is payload-based, and has a two-tier architecture: the first stage consists of a Self-Organi...
Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, ...