Results 1 - 10
of
88
A transparent deployment method of RSVP-aware applications on UNIX
"... This paper proposes a method, called RLR (RSVP (Resource reSerVation Protocol) library redirection), which can transform legacy Internet applications into RSVP-aware applications without modifying their source files by redirecting procedure calls from the socket library to the RAPI library. This met ..."
Abstract
- Add to MetaCart
This paper proposes a method, called RLR (RSVP (Resource reSerVation Protocol) library redirection), which can transform legacy Internet applications into RSVP-aware applications without modifying their source files by redirecting procedure calls from the socket library to the RAPI library
Architectures for Application Transparent Proxies: A Study of Network Enhancing Software
, 2001
"... Proxies, software deployed inside the network, play a fundamental role in the Internet by providing enhanced functionality to the network. Deployment of proxies is a flexible way of extending the Internet architecture with new services and to cope with problems that were not foreseen at the time the ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
configuration and deployment, especially with respect to interference between different proxies. With a limited number of different proxies, this problem can be dealt with manually, or by encoding knowledge of interfering proxies into each proxy. As the number of proxies grow, methods to automatically detect
SIMULATION, DEVELOPMENT AND DEPLOYMENT OF MOBILE WIRELESS SENSOR NETWORKS FOR MIGRATORY BIRD TRACKING
, 2012
"... This thesis presents CraneTracker, a multi-modal sensing and communication system for monitoring migratory species at the continental level. By exploiting the robust and extensive cellular infrastructure across the continent, traditional mobile wireless sensor networks can be extended to enable reli ..."
Abstract
- Add to MetaCart
This thesis presents CraneTracker, a multi-modal sensing and communication system for monitoring migratory species at the continental level. By exploiting the robust and extensive cellular infrastructure across the continent, traditional mobile wireless sensor networks can be extended to enable
Guaranteeing Communication Quality in Real World WSN Deployments
"... April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by: ..."
Abstract
- Add to MetaCart
April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by:
Electronics in Physics & Robotics Research Article An Improved and Secure Motion Detection Surveillance System in UNIX
, 2013
"... Abstract. These days motion detection in surveillance technology has a trend to deploy to security sectors using radar motion detector, wireless sensors, Micro-Electro-Mechanical Systems (MEMS) Inertial Sensors etc in Unix system. This research focuses on motion detection using combination of optica ..."
Abstract
- Add to MetaCart
Abstract. These days motion detection in surveillance technology has a trend to deploy to security sectors using radar motion detector, wireless sensors, Micro-Electro-Mechanical Systems (MEMS) Inertial Sensors etc in Unix system. This research focuses on motion detection using combination
Adaptive Load Migration Systems for PVM
, 1994
"... Adaptive load distribution is necessary for parallel applications to co-exist effectively with other jobs in a network of shared heterogeneous workstations. We present three methods that provide such support for PVM applications. Two of these methods, MPVM and UPVM, adapt to changes in the workstati ..."
Abstract
-
Cited by 54 (2 self)
- Add to MetaCart
in the workstation environment by transparently migrating the virtual processors (VPs) of the parallel application. A VP in MPVM is a Unix process, while UPVM defines light-weight, process-like VPs. The third method, ADM, is a programming methodology for writing programs that perform adaptive load distribution
Compositional Verification using CADP of the ScalAgent Deployment Protocol for Software Components
, 2003
"... In this report, we present the application of the Cadp verification toolbox to check the correctness of an industrial protocol for deploying and configuring transparently a large set of heterogeneous software components over a set of distributed computers/devices. To cope with the intrinsic comple ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
In this report, we present the application of the Cadp verification toolbox to check the correctness of an industrial protocol for deploying and configuring transparently a large set of heterogeneous software components over a set of distributed computers/devices. To cope with the intrinsic
The Possibility Of Implementing Of The Corporate Governance To Increase The Transparency And Disclosure In The Financial Statements
"... Abstract: The banking industry the power of economic life because of their role and influence effectively in the development and management of the helm of the economic process on the global and local levels and in various fields of development and investment, given the position enjoyed by the indust ..."
Abstract
- Add to MetaCart
from the Auditing Firms which working in Jordan, for each sample was distributed a separate questionnaire as primary method to collect data, and we used the LIKART scale to test these data. This study shows that the bank’s managers Believe in the main branches of the need for a direct application
gCitizen: A Grid Middleware for a Transparent Management of the Information about Citizens in
"... This paper proposes the Grid technology as an integration method of information, existing procedures and resources in the Public Administration. The exposed work supposes, from the point of view of the electronic government, an advance of future trends by means of the usage of Grid technology. On th ..."
Abstract
- Add to MetaCart
. On the other hand, from the perspective of Grid technology, the electronic government opens a non-evident field of application for this emergent paradigm of distributed computing. This paper explains gCitizen, which is a Grid middleware based on the GT4 components and WSRF implementation (which are the state
SigFree: A Signature-Free Buffer Overflow Attack Blocker
- Ieee Transactions On Dependable And Secure Computing
, 2010
"... Abstract—We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet services such as web service. Motivated by the observation that buffer overflow attacks typically contain executable ..."
Abstract
-
Cited by 50 (8 self)
- Add to MetaCart
for exploit code to evade. SigFree is signature free, thus it can block new and unknown buffer overflow attacks; SigFree is also immunized from most attack-side code obfuscation methods. Since SigFree is a transparent deployment to the servers being protected, it is good for economical Internet
Results 1 - 10
of
88