Sciweavers

598 search results - page 90 / 120
» A fair certification protocol
Sort
View
FC
2008
Springer
81views Cryptology» more  FC 2008»
13 years 11 months ago
Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes
At Oakland 2005, Murdoch and Danezis described an attack on the Tor anonymity service that recovers the nodes in a Tor circuit, but not the client. We observe that in a peer-to-pee...
Jon McLachlan, Nicholas Hopper
FMCAD
2008
Springer
13 years 11 months ago
Verifying an Arbiter Circuit
Abstract--This paper presents the verification of an asynchronous arbiter modeled at the circuit level with non-linear ordinary differential equations. We use Brockett's annul...
Chao Yan, Mark R. Greenstreet
MASCOTS
2004
13 years 11 months ago
Simulation Evaluation of Hybrid SRPT Scheduling Policies
This paper uses trace-driven simulations to evaluate two novel Web server scheduling policies called KSRPT and T-SRPT. K-SRPT is a multi-threaded version of SRPT (Shortest Remaini...
Mingwei Gong, Carey L. Williamson
ACTA
2006
108views more  ACTA 2006»
13 years 10 months ago
Refinement verification of the lazy caching algorithm
The lazy caching algorithm of Afek, Brown, and Merrit (1993) is a protocol that allows the use of local caches with delayed updates. It results in a memory model that is not atomi...
Wim H. Hesselink
JNW
2006
85views more  JNW 2006»
13 years 9 months ago
Seamless Handoff Solution For Nested Mobile Networks
Ensuring seamless mobility for users is becoming one of the main objectives of ongoing research activities in the field of data telecommunications. More over, if some proposals are...
Mehdi Sabeur, Badii Jouaber, Djamal Zeghlache