Sciweavers

1937 search results - page 194 / 388
» Virtual networking
Sort
View
ASPLOS
2009
ACM
16 years 4 months ago
TwinDrivers: semi-automatic derivation of fast and safe hypervisor network drivers from guest OS drivers
In a virtualized environment, device drivers are often run inside a virtual machine (VM) rather than in the hypervisor, for reasons of safety and reduction in software engineering...
Aravind Menon, Simon Schubert, Willy Zwaenepoel
COMPSEC
2006
110views more  COMPSEC 2006»
15 years 4 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
NOMS
2000
IEEE
144views Communications» more  NOMS 2000»
15 years 8 months ago
Managing application services over service provider networks: architecture and dependency analysis
This paper proposes a novel approach for managing IP-based services and applications, reflecting the authors’ experience with the IBM Global Network. It describes how one can e...
Gautam Kar, Alexander Keller, Seraphin B. Calo
IWAN
2004
Springer
15 years 9 months ago
Dynamic Link Measurements Using Active Components
Active and programmable network technologies strive to support completely new forms of data-path processing capabilities inside the network. This in conjunction with the ability to...
Dimitrios P. Pezaros, Manolis Sifalakis, Stefan Sc...
PERCOM
2006
ACM
15 years 4 months ago
Bootstrapping Chord in Ad Hoc Networks: Not Going Anywhere for a While.
With the growing prevalence of wireless devices, infrastructure-less ad hoc networking is coming closer to reality. Research in this field has mainly been concerned with routing. ...
Curt Cramer, Thomas Fuhrmann