• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 88
Next 10 →

A transparent deployment method of RSVP-aware applications on UNIX

by Yu-ben Miao A, Wen-shyang Hwang B, Ce-kuen Shieh A
"... This paper proposes a method, called RLR (RSVP (Resource reSerVation Protocol) library redirection), which can transform legacy Internet applications into RSVP-aware applications without modifying their source files by redirecting procedure calls from the socket library to the RAPI library. This met ..."
Abstract - Add to MetaCart
This paper proposes a method, called RLR (RSVP (Resource reSerVation Protocol) library redirection), which can transform legacy Internet applications into RSVP-aware applications without modifying their source files by redirecting procedure calls from the socket library to the RAPI library

Architectures for Application Transparent Proxies: A Study of Network Enhancing Software

by Bjorn Knutsson, Bj Orn Knutsson , 2001
"... Proxies, software deployed inside the network, play a fundamental role in the Internet by providing enhanced functionality to the network. Deployment of proxies is a flexible way of extending the Internet architecture with new services and to cope with problems that were not foreseen at the time the ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
configuration and deployment, especially with respect to interference between different proxies. With a limited number of different proxies, this problem can be dealt with manually, or by encoding knowledge of interfering proxies into each proxy. As the number of proxies grow, methods to automatically detect

SIMULATION, DEVELOPMENT AND DEPLOYMENT OF MOBILE WIRELESS SENSOR NETWORKS FOR MIGRATORY BIRD TRACKING

by Bird Tracking, William P. Bennett, William P., Development, Deployment Of, Mobile Wireless Sensor, William P. Bennett, William P. Bennett, Adviser Mehmet, C. Vuran , 2012
"... This thesis presents CraneTracker, a multi-modal sensing and communication system for monitoring migratory species at the continental level. By exploiting the robust and extensive cellular infrastructure across the continent, traditional mobile wireless sensor networks can be extended to enable reli ..."
Abstract - Add to MetaCart
This thesis presents CraneTracker, a multi-modal sensing and communication system for monitoring migratory species at the continental level. By exploiting the robust and extensive cellular infrastructure across the continent, traditional mobile wireless sensor networks can be extended to enable

Guaranteeing Communication Quality in Real World WSN Deployments

by Fbk-irst Bruno, Kessler Foundation, Matteo Ceriotti, Dr. Amy, L. Murphy, Bruno Kessler Foundation (fbk-irst, Amy L. Murphy, Prof Prabal Dutta, Prof Koen Langendoen, Prof Leo Selavo
"... April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by: ..."
Abstract - Add to MetaCart
April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by:

Electronics in Physics & Robotics Research Article An Improved and Secure Motion Detection Surveillance System in UNIX

by Syed Zahurul, Razali Jidin, Norashidah Md. Din, Syed Zahidul , 2013
"... Abstract. These days motion detection in surveillance technology has a trend to deploy to security sectors using radar motion detector, wireless sensors, Micro-Electro-Mechanical Systems (MEMS) Inertial Sensors etc in Unix system. This research focuses on motion detection using combination of optica ..."
Abstract - Add to MetaCart
Abstract. These days motion detection in surveillance technology has a trend to deploy to security sectors using radar motion detector, wireless sensors, Micro-Electro-Mechanical Systems (MEMS) Inertial Sensors etc in Unix system. This research focuses on motion detection using combination

Adaptive Load Migration Systems for PVM

by Jeremy Casas, Ravi Konuru, Robert Prouty, Jonathan Walpole, Steve W. Otto, Steve W. Otto , 1994
"... Adaptive load distribution is necessary for parallel applications to co-exist effectively with other jobs in a network of shared heterogeneous workstations. We present three methods that provide such support for PVM applications. Two of these methods, MPVM and UPVM, adapt to changes in the workstati ..."
Abstract - Cited by 54 (2 self) - Add to MetaCart
in the workstation environment by transparently migrating the virtual processors (VPs) of the parallel application. A VP in MPVM is a Unix process, while UPVM defines light-weight, process-like VPs. The third method, ADM, is a programming methodology for writing programs that perform adaptive load distribution

Compositional Verification using CADP of the ScalAgent Deployment Protocol for Software Components

by Frédéric Tronel, Frédéric Lang, Hubert Garavel , 2003
"... In this report, we present the application of the Cadp verification toolbox to check the correctness of an industrial protocol for deploying and configuring transparently a large set of heterogeneous software components over a set of distributed computers/devices. To cope with the intrinsic comple ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
In this report, we present the application of the Cadp verification toolbox to check the correctness of an industrial protocol for deploying and configuring transparently a large set of heterogeneous software components over a set of distributed computers/devices. To cope with the intrinsic

The Possibility Of Implementing Of The Corporate Governance To Increase The Transparency And Disclosure In The Financial Statements

by Dr. Mohammad Farouq Shbool, Dr. Anas Ali Al-qudah, Dr. Nawwaf Hamid Alfawaerah
"... Abstract: The banking industry the power of economic life because of their role and influence effectively in the development and management of the helm of the economic process on the global and local levels and in various fields of development and investment, given the position enjoyed by the indust ..."
Abstract - Add to MetaCart
from the Auditing Firms which working in Jordan, for each sample was distributed a separate questionnaire as primary method to collect data, and we used the LIKART scale to test these data. This study shows that the bank’s managers Believe in the main branches of the need for a direct application

gCitizen: A Grid Middleware for a Transparent Management of the Information about Citizens in

by Carlos De Alfonso, Miguel Caballer, José V. Carrión, Vicente Hernández, Carlos De Alfonso, Miguel Caballer, José V. Carrión
"... This paper proposes the Grid technology as an integration method of information, existing procedures and resources in the Public Administration. The exposed work supposes, from the point of view of the electronic government, an advance of future trends by means of the usage of Grid technology. On th ..."
Abstract - Add to MetaCart
. On the other hand, from the perspective of Grid technology, the electronic government opens a non-evident field of application for this emergent paradigm of distributed computing. This paper explains gCitizen, which is a Grid middleware based on the GT4 components and WSRF implementation (which are the state

SigFree: A Signature-Free Buffer Overflow Attack Blocker

by Xinran Wang, Chi-chun Pan, Peng Liu, Sencun Zhu - Ieee Transactions On Dependable And Secure Computing , 2010
"... Abstract—We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet services such as web service. Motivated by the observation that buffer overflow attacks typically contain executable ..."
Abstract - Cited by 50 (8 self) - Add to MetaCart
for exploit code to evade. SigFree is signature free, thus it can block new and unknown buffer overflow attacks; SigFree is also immunized from most attack-side code obfuscation methods. Since SigFree is a transparent deployment to the servers being protected, it is good for economical Internet
Next 10 →
Results 1 - 10 of 88
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University