Sciweavers

5234 search results - page 883 / 1047
» Simulation of Computer Network Attacks
Sort
View
DSOM
2005
Springer
15 years 9 months ago
Design and Implementation of Performance Policies for SMS Systems
We present a design for policy-based performance management of SMS Systems. The design takes as input the operator’s performance goals, which are expressed as policies that can b...
Alberto Gonzalez Prieto, Rolf Stadler
155
Voted
ISCC
2003
IEEE
130views Communications» more  ISCC 2003»
15 years 9 months ago
Congestion-Aware Multicast Routing for Supporting QoS over the Internet
Multicasting is an efficient and effective approach for supporting content distribution based on the current Internet infrastructure. In this paper, we have proposes the source-in...
Jian Zhao, Hossam S. Hassanein, Jieyi Wu, Junzhou ...
147
Voted
DSN
2000
IEEE
15 years 8 months ago
Resource Scheduling in Dependable Integrated Modular Avionics
In the recent development of avionics systems, Integrated Modular Avionics (IMA) is advocated for next generation architecture that needs integration of mixedcriticality real-time...
Yann-Hang Lee, Daeyoung Kim, Mohamed F. Younis, Je...
NSDI
2007
15 years 6 months ago
Mutually Controlled Routing with Independent ISPs
Abstract – We present Wiser, an Internet routing protocol that enables ISPs to jointly control routing in a way that produces efficient end-to-end paths even when they act in th...
Ratul Mahajan, David Wetherall, Thomas E. Anderson
135
Voted
WORM
2004
15 years 5 months ago
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Self-propagating computer worms have been terrorizing the Internet for the last several years. With the increasing density, inter-connectivity and bandwidth of the Internet combin...
Frank Castaneda, Emre Can Sezer, Jun Xu