Sciweavers

3458 search results - page 655 / 692
» Abstracting Control
Sort
View
LCPC
2005
Springer
14 years 1 months ago
Manipulating MAXLIVE for Spill-Free Register Allocation
Abstract. Many embedded systems use single-chip microcontrollers which have no on-chip RAM. In such a system, the processor registers must hold all live data values. Nanocontroller...
Shashi Deepa Arcot, Henry G. Dietz, Sarojini Priya...
PAM
2005
Springer
14 years 1 months ago
A Merged Inline Measurement Method for Capacity and Available Bandwidth
— We have proposed a new TCP version, called ImTCP (Inline measurement TCP), in [1]. The ImTCP sender adjusts the transmission intervals of data packets, and then utilizes the ar...
Cao Le Thanh Man, Go Hasegawa, Masayuki Murata
RAID
2005
Springer
14 years 1 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
RAID
2005
Springer
14 years 1 months ago
Polymorphic Worm Detection Using Structural Information of Executables
Abstract. Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large number of hosts. Because of the speed at...
Christopher Krügel, Engin Kirda, Darren Mutz,...
SSS
2005
Springer
132views Control Systems» more  SSS 2005»
14 years 1 months ago
Self-stabilizing Mobile Node Location Management and Message Routing
We present simple algorithms for achieving self-stabilizing location management and routing in mobile ad-hoc networks. While mobile clients may be susceptible to corruption and sto...
Shlomi Dolev, Limor Lahiani, Nancy A. Lynch, Tina ...