Sciweavers

1937 search results - page 331 / 388
» Virtual networking
Sort
View
SENSYS
2010
ACM
15 years 1 months ago
Revealing the hidden lives of underground animals using magneto-inductive tracking
Currently, there is no existing method for automatically tracking the location of burrowing animals when they are underground, consequently zoologists only have a partial view of ...
Andrew Markham, Niki Trigoni, Stephen A. Ellwood, ...
ICUMT
2009
15 years 1 months ago
Service and Resource Discovery supports over P2P overlays
We describe the main architecture and the design principles of the Service/Resource Discovery System (SRDS), a component of the XtreemOS Operating System. XtreemOS is a Linux exten...
Emanuele Carlini, Massimo Coppola, Patrizio Dazzi,...
149
Voted
JOC
2010
92views more  JOC 2010»
14 years 10 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
229
Voted
FORTE
2011
14 years 7 months ago
A Framework for Verifying Data-Centric Protocols
Abstract. Data centric languages, such as recursive rule based languages, have been proposed to program distributed applications over networks. They simplify greatly the code, whic...
Yuxin Deng, Stéphane Grumbach, Jean-Fran&cc...
197
Voted
IWQOS
2011
Springer
14 years 6 months ago
OLIC: OnLine Information Compression for scalable hosting infrastructure monitoring
—Quality-of-service (QoS) management often requires a continuous monitoring service to provide updated information about different hosts and network links in the managed system. ...
Yongmin Tan, Xiaohui Gu, Vinay Venkatesh