Sciweavers

741 search results - page 107 / 149
» Abstract Machines for Communication Security
Sort
View
DATE
2009
IEEE
178views Hardware» more  DATE 2009»
14 years 4 months ago
Correct-by-construction generation of device drivers based on RTL testbenches
Abstract—The generation of device drivers is a very time consuming and error prone activity. All the strategies proposed up to now to simplify this operation require a manual, ev...
Nicola Bombieri, Franco Fummi, Graziano Pravadelli...
INFOCOM
2012
IEEE
12 years 14 days ago
Experimental performance comparison of Byzantine Fault-Tolerant protocols for data centers
Abstract—In this paper, we implement and evaluate three different Byzantine Fault-Tolerant (BFT) state machine replication protocols for data centers: (1) BASIC: The classic solu...
Guanfeng Liang, Benjamin Sommer, Nitin H. Vaidya
ICICS
2005
Springer
14 years 3 months ago
Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream
Abstract. Multimedia community is moving from monolithic applications to more flexible and scalable integrated solutions. Stream authentication is more complex since a stream may ...
Tieyan Li, Huafei Zhu, Yongdong Wu
MATA
2004
Springer
113views Communications» more  MATA 2004»
14 years 3 months ago
PEARL: A PErformance evaluAtor of cRyptographic aLgorithms for Mobile Devices
Abstract. Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cry...
José Bringel Filho, Windson Viana, Rossana ...
MASCOTS
2007
13 years 11 months ago
Multiobjective Analysis in Wireless Mesh Networks
Abstract— Wireless Mesh Networks are a scalable and costeffective solution for next-generation wireless networking. In the present work, we consider the Round Weighting Problem (...
Cristiana Gomes, Gurvan Huiban