Results 1 - 10
of
1,556
OpenFlow: Enabling Innovation in Campus Networks
, 2008
"... This whitepaper proposes OpenFlow: a way for researchers to run experimental protocols in the networks they use every day. OpenFlow is based on an Ethernet switch, with an internal flow-table, and a standardized interface to add and remove flow entries. Our goal is to encourage networking vendors ..."
Abstract
-
Cited by 718 (84 self)
- Add to MetaCart
This whitepaper proposes OpenFlow: a way for researchers to run experimental protocols in the networks they use every day. OpenFlow is based on an Ethernet switch, with an internal flow-table, and a standardized interface to add and remove flow entries. Our goal is to encourage networking vendors
lmbench: Portable Tools for Performance Analysis
- In USENIX Annual Technical Conference
, 1996
"... lmbench: Portable tools for performance analysis lmbench is a micro-benchmark suite designed to focus attention on the basic building blocks of many common system applications, such as databases, simulations, software development, and networking. In almost all cases, the individual tests are the res ..."
Abstract
-
Cited by 464 (2 self)
- Add to MetaCart
lmbench: Portable tools for performance analysis lmbench is a micro-benchmark suite designed to focus attention on the basic building blocks of many common system applications, such as databases, simulations, software development, and networking. In almost all cases, the individual tests
Delayed internet routing convergence
- ACM SIGCOMM Computer Communication Review
, 2000
"... Abstract—This paper examines the latency in Internet path failure, failover, and repair due to the convergence properties of interdomain routing. Unlike circuit-switched paths which exhibit failover on the order of milliseconds, our experimental mea-surements show that interdomain routers in the pac ..."
Abstract
-
Cited by 408 (5 self)
- Add to MetaCart
with respect to the number of autonomous systems in the Internet. Finally, we demonstrate that much of the observed convergence delay stems from specific router vendor implementation decisions and ambiguity in the BGP specification. Index Terms—Failure analysis, Internet, network reliability, routing. I.
The Illusion of Vendor Support
- RFC 873, MITRE
, 1982
"... The sometimes-held position that "vendor supplied" intercomputer networking protocols based upon the International Standards Organization’s Reference Model for Open System Interconnection are worth waiting for, in particular in preference to protocols based upon the ARPANET Reference Model ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
The sometimes-held position that "vendor supplied" intercomputer networking protocols based upon the International Standards Organization’s Reference Model for Open System Interconnection are worth waiting for, in particular in preference to protocols based upon the ARPANET Reference
Vendors and External Outsource Providers-
, 2003
"... Let us assume your business is fairly accomplished in the Risk Assessment evolutionary ladder. Perhaps your company already assesses its network configurations regularly, all the applications in use have been reviewed for stringent security guidelines, maybe the IT team has even classified all your ..."
Abstract
- Add to MetaCart
corporate information assets, and the vulnerability assessments are complete. Does this mean the CIO can relax? Is the business safe? Is your network or information accessed by a third party vendor? Where is your information... Copyright SANS Institute
Vendors and External Outsource Providers-
, 2003
"... Let us assume your business is fairly accomplished in the Risk Assessment evolutionary ladder. Perhaps your company already assesses its network configurations regularly, all the applications in use have been reviewed for stringent security guidelines, maybe the IT team has even classified all your ..."
Abstract
- Add to MetaCart
corporate information assets, and the vulnerability assessments are complete. Does this mean the CIO can relax? Is the business safe? Is your network or information accessed by a third party vendor? Where is your information... Copyright SANS Institute
Vendors and External Outsource Providers-
, 2003
"... Let us assume your business is fairly accomplished in the Risk Assessment evolutionary ladder. Perhaps your company already assesses its network configurations regularly, all the applications in use have been reviewed for stringent security guidelines, maybe the IT team has even classified all your ..."
Abstract
- Add to MetaCart
corporate information assets, and the vulnerability assessments are complete. Does this mean the CIO can relax? Is the business safe? Is your network or information accessed by a third party vendor? Where is your information... Copyright SANS Institute
THE ILLUSION OF VENDOR SUPPORT
, 1982
"... The sometimes-held position that "vendor supplied" intercomputer networking protocols based upon the International Standards Organization’s Reference Model for Open System Interconnection are worth waiting for, in particular in preference to protocols based upon the ARPANET Reference Model ..."
Abstract
- Add to MetaCart
The sometimes-held position that "vendor supplied" intercomputer networking protocols based upon the International Standards Organization’s Reference Model for Open System Interconnection are worth waiting for, in particular in preference to protocols based upon the ARPANET Reference
DHCP Options and BOOTP Vendor Extensions
- RFC
, 1997
"... This document is an Internet-Draft. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six ..."
Abstract
-
Cited by 29 (3 self)
- Add to MetaCart
to hosts on a TCP/IP network. Configuration parameters and other control information are carried in tagged data items that are stored in the ’options ’ field of the DHCP message. The data items themselves are also called "options." This document specifies the current set of DHCP options. Future
Panorama: Capturing system-wide information flow for malware detection and analysis
- In Proceedings of the 14th ACM Conferences on Computer and Communication Security (CCS’07
, 2007
"... Malicious programs spy on users ’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undesirable actions. Unfortunately, existing techniques for detecting malware and analyzing unknown code samples are insufficie ..."
Abstract
-
Cited by 195 (28 self)
- Add to MetaCart
Malicious programs spy on users ’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undesirable actions. Unfortunately, existing techniques for detecting malware and analyzing unknown code samples
Results 1 - 10
of
1,556