Multipath TCP: from theory to practice

S Barré, C Paasch, O Bonaventure - … 2011: 10th International IFIP TC 6 …, 2011 - Springer
The IETF is develo** a new transport layer solution, MultiPath TCP (MPTCP), which
allows to efficiently exploit several Internet paths between a pair of hosts, while presenting a …

Learning and detecting activities from movement trajectories using the hierarchical hidden Markov model

NT Nguyen, DQ Phung, S Venkatesh… - 2005 IEEE Computer …, 2005 - ieeexplore.ieee.org
Directly modeling the inherent hierarchy and shared structures of human behaviors, we
present an application of the hierarchical hidden Markov model (HHMM) for the problem of …

[SÁCH][B] Professional Linux kernel architecture

W Mauerer - 2010 - books.google.com
Find an introduction to the architecture, concepts and algorithms of the Linux kernel in
Professional Linux Kernel Architecture, a guide to the kernel sources and large number of …

Analysis of open source drivers for IEEE 802.11 WLANs

M Vipin, S Srikanth - 2010 International Conference on …, 2010 - ieeexplore.ieee.org
The purpose of this study is to analyze the open source IEEE 802.11 wireless local area
network (WLAN) stack implementation for further enhancement and implementations. We …

The performance analysis of Linux networking–packet receiving

W Wu, M Crawford, M Bowden - Computer Communications, 2007 - Elsevier
The computing models for high-energy physics experiments are becoming ever more
globally distributed and grid-based, both for technical reasons (eg, to place computational …

Connecting the world of embedded mobiles: The riot approach to ubiquitous networking for the internet of things

M Lenders, P Kietzmann, O Hahm, H Petersen… - arxiv preprint arxiv …, 2018 - arxiv.org
The Internet of Things (IoT) is rapidly evolving based on low-power compliant protocol
standards that extend the Internet into the embedded world. Pioneering implementations …

GuaranTEE: Introducing control-flow attestation for trusted execution environments

M Morbitzer, B Kopf, P Zieris - 2023 IEEE 16th International …, 2023 - ieeexplore.ieee.org
Many cloud providers offer Trusted Execution Environments (TEEs) to protect critical data
and processes from high privileged adversaries. Unfortunately, TEEs can only be attested at …

[PDF][PDF] Linux Software Router: Data Plane Optimization and Performance Evaluation.

R Bolla, R Bruschi - J. Networks, 2007 - academia.edu
Recent technological advances provide an excellent opportunity to achieve truly effective
results in the field of open Internet devices, also known as Open Routers or ORs. Even …

A network-based intrusion detection and prevention system with multi-mode counteractions

RM Yousufi, P Lalwani… - … Conference on Innovations …, 2017 - ieeexplore.ieee.org
Recently, as result of dramatic connectivity between devices from a computer to mobile
systems, security of information and availability of the services become more and more …

[PDF][PDF] Live memory forensics on android with volatility

H Macht - Friedrich-Alexander University Erlangen-Nuremberg, 2013 - homac.github.io
More and more people rely on smartphones to manage their personal data. For many, it has
become a constant companion for a variety of tasks, such as making calls, surfing the web …