Sciweavers

1937 search results - page 193 / 388
» Virtual networking
Sort
View
ACSAC
2005
IEEE
15 years 9 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
USITS
2001
15 years 5 months ago
Alpine: A User-Level Infrastructure for Network Protocol Development
In traditional operating systems, modifying the network protocol code is a tedious and error-prone task, largely because the networking stack resides in the kernel. For this reaso...
David Ely, Stefan Savage, David Wetherall
JNCA
2008
104views more  JNCA 2008»
15 years 4 months ago
Computing in social networks with relationship algebra
Communities are the latest phenomena on the Internet. At the heart of each community lies a social network. In this paper, we show a generalized framework to understand and reason...
Javed I. Khan, Sajid S. Shaikh
ICSEA
2006
IEEE
15 years 10 months ago
UbiNet: A Generic and Ubiquitous Service Provider Framework
—In mobile environment, it is very common that mobile devices periodically stay in disconnection mode. In a networked world as today, computer users rely on network services so h...
Jinsuo Zhang, Sumi Helal
196
Voted
DMSN
2010
ACM
15 years 5 months ago
DEMS: a data mining based technique to handle missing data in mobile sensor network applications
In Mobile Sensor Network (MSN) applications, sensors move to increase the area of coverage and/or to compensate for the failure of other sensors. In such applications, loss or cor...
Le Gruenwald, Md. Shiblee Sadik, Rahul Shukla, Han...