Sciweavers

277 search results - page 43 / 56
» Virtualization Techniques in Network Emulation Systems
Sort
View
ICPADS
2008
IEEE
15 years 6 months ago
Textures in Second Life: Measurement and Analysis
We collected packet traces from Second Life client sessions and analyzed the packet contents. We observed that textures constitute a majority of the network traffic. We further c...
Huiguang Liang, Mehul Motani, Wei Tsang Ooi
VIZSEC
2004
Springer
15 years 5 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
102
Voted
SECON
2007
IEEE
15 years 6 months ago
CODE: Cooperative Medium Access for Multirate Wireless Ad Hoc Network
— Cooperative communications can help combat fading and hence can significantly increase the capacity of wireless networks. Although various schemes have been proposed to levera...
Kefeng Tan, Zhiwen Wan, Hao Zhu, Jean Andrian
TWC
2010
14 years 6 months ago
Dynamic Spectrum Access Using a Network Coded Cognitive Control Channel
In this paper we propose a Dynamic Spectrum Access scheme which allows the users to opportunistically and efficiently access the channels available for communications. It addresses...
Nicola Baldo, Alfred Asterjadhi, Michele Zorzi
DANCE
2002
IEEE
15 years 4 months ago
A Secure PLAN
— Active Networks, being programmable, promise greater flexibility than current networks. Programmability, however, may introduce safety and security risks. This paper describes...
Michael W. Hicks, Angelos D. Keromytis, Jonathan M...