Sciweavers

169 search results - page 11 / 34
» A secure role-based address allocation and distribution mech...
Sort
View
DRM
2005
Springer
14 years 28 days ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...
ICDCSW
2007
IEEE
14 years 1 months ago
A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing Systems
Free-riders and fake files are two important problems in P2P file sharing systems. Previous works have always used incentive mechanisms and trust mechanisms to address them resp...
Mao Yang, Qinyuan Feng, Yafei Dai, Zheng Zhang
ICS
2011
Tsinghua U.
12 years 10 months ago
Predictive coordination of multiple on-chip resources for chip multiprocessors
Efficient on-chip resource management is crucial for Chip Multiprocessors (CMP) to achieve high resource utilization and enforce system-level performance objectives. Existing mul...
Jian Chen, Lizy Kurian John
IWAN
2004
Springer
14 years 23 days ago
Secure, Customizable, Many-to-One Communication
Concast is a customizable many-to-one network-layer communication service. Although programmable services like concast can improve the efficiency of group applications, accompanyi...
Kenneth L. Calvert, Jim Griffioen, Billy Mullins, ...
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 2 months ago
Secure Communication and Access Control for Mobile Web Service Provisioning
It is now feasible to host basic web services on a smart phone due to the advances in wireless devices and mobile communication technologies. While the applications are quite welco...
Satish Narayana Srirama, Anton Naumenko