Sciweavers

2009 search results - page 212 / 402
» Towards Self-Configuring Networks
Sort
View
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
15 years 11 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...
GLOBECOM
2007
IEEE
15 years 11 months ago
Interference Model for Cognitive Coexistence in Cellular Systems
Abstract—Cognitive radio is a key enabling technology of dynamic spectrum access for exploiting unused spectrum resources. This article focuses on modeling the opportunity for ce...
Theodoros Kamakaris, Didem Kivanc-Tureli, Uf Turel...
NDSS
2007
IEEE
15 years 11 months ago
Army of Botnets
The trend toward smaller botnets may be more dangerous than large botnets, in terms of large-scale attacks like distributed denials of service. We examine the possibility of “su...
Ryan Vogt, John Aycock, Michael J. Jacobson Jr.
157
Voted
AIMS
2007
Springer
15 years 11 months ago
IBGP Confederation Provisioning
This paper proposes an optimization method for the design of large scale confederation based BGP networks. We propose a graph based model and an associated metric to evaluate the r...
Mohamed Nassar, Radu State, Olivier Festor
134
Voted
WWIC
2007
Springer
109views Communications» more  WWIC 2007»
15 years 11 months ago
QoS and Authentication Experiences in a Residential Environment Within a Broadband Access Framework
It is sometimes believed that a “broadband access” network, providing ample transmission capacity to residential environments, is enough so as to allow a flawless delivery of a...
Iván Vidal, Francisco Valera, Jaime Garc&ia...