Kgshin

E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks

E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks Xinyu Zhangand Kang G. Shin Department of Electrical Engineering and Computer Science The University of Michigan {xyzhang, kgshin}@eecs.umich.edu ABSTRACT WiFiinterfaceis known to be a primary energy consumer in mobile devices, and ...

kabru.eecs.umich.edu

Differentiated BGP Update Processing for Improved Routing ...

Wei Sun, Zhuoqing Morley Mao, Kang G. Shin University of Michigan f wsunz, zmao, kgshin g @eecs.umich.edu

www.eecs.umich.edu

EMERALDS: a small-memory real-timemicrokernel

Zuberi, Padmanabhan Pillai, and Kang G. Shin University of Michigan zuberi,pillai,kgshin@eecs.umich. edu Abstract EMERALDS (Extensible Microkernelfor Embedded, ReAL-time, Distributed Systems) is areal-timemicrokernel designed for small-memory embedded applications.

www.cs.berkeley.edu

Performance Modeling for Software Integration

Performance Modeling for Software Integration KangG. Shin and Shige Wang Real-Time Computing Laboratory Department of Electrical Engineering and Computer Science The University of Michigan Ann Arbor, MI 48109-2122 email: wangsg,kgshin@eecs.umich.edu Abstract —Software construction with ...

www.nitrd.gov

LiteGreen: Saving Energy in Networked Desktops Using ...

Shin [email protected] kgshin@eecs.umich.edu Microsoft Research India The University of Michigan Abstract To reduce energy wastage by idle desktop computers in enterprise environments, the typical approach is to put a computer to sleep during long idle periods (e.g., overnight), with a proxy employed ...

research.microsoft.com

Large-Scale Malware Indexing Using Function-Call Graphs∗†

Shin University of Michigan Michigan, USA kgshin@eecs.umich.edu ABSTRACT A major challenge of the anti-virus (AV) industry is how to ef-fectivelyprocess the huge influx of malwaresamples they receive everyday.

www.ecsl.cs.sunysb.edu

Detecting SYN Flooding Attacks

Detecting SYN Flooding Attacks Haining WangDanlu Zhang Kang G. Shin EECS Department, The University of Michigan Ann Arbor, MI 48109-2122 hxw, danlu, kgshin@eecs.umich.edu Abstract —We proposeasimple and robust mechanism for de-tectingSYN flooding attacks.

users.cs.jmu.edu

An OptimalSensing Framework Based on Spatial RSS-profile in ...

An OptimalSensing Framework Based on Spatial RSS-profile in Cognitive Radio Networks AlexanderW. Minand Kang G. Shin Real-Time Computing Laboratory, Dept. of EECS The University of Michigan, Ann Arbor, MI 48109-2121 {alexmin,kgshin}@eecs.umich.edu Abstract —In cognitive radio networks (CRNs ...

kabru.eecs.umich.edu

UMAV: A Simple Enhancement to the IEEE 802.11 DCF

UMAV: A Simple Enhancement to the IEEE 802.11 DCF Daji QiaoandKang G. Shin Real-Time Computing Laboratory The UniversityofMichigan Email: { dqiao,kgshin } @eecs.umich.edu Abstract —In this paper, we propose a simple enhancement to the Distributed Coordination Function (DCF) of the IEEE 802.11 ...

www.hicss.hawaii.edu

Hop-Count Filtering: An Effective Defense Against Spoofed ...

Shin EECS Department University of Michigan Ann Arbor, MI 48105 kgshin@eecs.umich.edu ABSTRACT IP spoofinghas been exploited by Distributed Denial of Service (DDoS) attacks to (1) conceal flooding sources and localities in flooding traffic, and (2) coax legitimate hosts into becoming reflectors ...

users.cs.jmu.edu

Other sites you could try:

Find videos related to Kgshin