Sciweavers

277 search results - page 33 / 56
» Virtualization Techniques in Network Emulation Systems
Sort
View
102
Voted
CONEXT
2009
ACM
15 years 26 days ago
RFDump: an architecture for monitoring the wireless ether
Networking researchers have been using tools like wireshark and tcpdump to sniff packets on physical links that use different types of datalink protocols, e.g. Ethernet or 802.11,...
Kaushik Lakshminarayanan, Samir Sapra, Srinivasan ...
VEE
2012
ACM
218views Virtualization» more  VEE 2012»
13 years 7 months ago
Enhancing TCP throughput of highly available virtual machines via speculative communication
Checkpoint-recovery based virtual machine (VM) replication is an attractive technique for accommodating VM installations with high-availability. It provides seamless failover for ...
Balazs Gerofi, Yutaka Ishikawa
136
Voted
UBIMOB
2009
ACM
225views Management» more  UBIMOB 2009»
15 years 4 months ago
Historical data storage for large scale sensor networks
Wireless sensor networks are rapidly finding their way through a plethora of new applications like precision farming and forestry, with increasing network scale, system complexit...
Loïc Petit, Abdelhamid Nafaa, Raja Jurdak
IGPL
2010
125views more  IGPL 2010»
14 years 10 months ago
A normative multiagent approach to requirements engineering
In this paper we present a new model for the requirements analysis of a system. We offer a conceptual model defined following a visual modeling language, called dependence network...
Serena Villata
SIGSOFT
2007
ACM
16 years 15 days ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna