Sciweavers

12637 search results - page 2411 / 2528
» Security for Extensible Systems
Sort
View
MOBIWAC
2009
ACM
15 years 10 months ago
Protocol design and analysis of a HIP-based per-application mobility management platform
Rapid evolution of wireless networking has provided wide-scale of different wireless access technologies like Bluetooth, ZigBee, 802.11a/b/g, DSRC, 3G UMTS, LTE, WiMAX, etc. The c...
László Bokor, László T...
SIGCOMM
2009
ACM
15 years 10 months ago
Router primitives for programmable active measurement
Active probe-based measurements are the foundation for understanding important network path properties such as SLA compliance and available bandwidth. Well-known challenges in act...
Joel Sommers, Paul Barford, Mark Crovella
ICRA
2008
IEEE
132views Robotics» more  ICRA 2008»
15 years 10 months ago
The OmniTread OT-4 serpentine robot
Serpentine robots are slender, multi-segmented vehicles designed to provide greater mobility than conventional mobile robots. Serpentine robots are ideally suited for urban search...
Johann Borenstein, Adam Borrell
SRDS
2008
IEEE
15 years 10 months ago
Systematic Structural Testing of Firewall Policies
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. As the quality of protection provided by a firewall dire...
JeeHyun Hwang, Tao Xie, Fei Chen, Alex X. Liu
COMSWARE
2007
IEEE
15 years 10 months ago
OASiS: A Programming Framework for Service-Oriented Sensor Networks
Abstract— Wireless sensor networks consist of small, inexpensive devices which interact with the environment, communicate with each other, and perform distributed computations in...
Manish Kushwaha, Isaac Amundson, Xenofon D. Koutso...
« Prev « First page 2411 / 2528 Last » Next »