Sciweavers

214 search results - page 25 / 43
» Abstraction and extensibility in digital logic simulation so...
Sort
View
CSREASAM
2008
14 years 9 days ago
Implementing Cryptography for Packet Level Authentication
Abstract--Packet Level Authentication (PLA) is a novel countermeasure against distributed denial-of-service attacks. Each packet sent across a network has a digital signature and p...
Billy Bob Brumley
ASWEC
2007
IEEE
14 years 2 months ago
Influence Control for Dynamic Reconfiguration
Influence control is a very challenging issue in dynamic reconfiguration and still not well addressed in the literature. This paper argues that dynamic reconfiguration influences s...
Zhikun Zhao, Wei Li
EUROSYS
2009
ACM
14 years 8 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conď¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
IPSN
2010
Springer
14 years 25 days ago
Information processing for live photo mosaic with a group of wireless image sensors
Photo tourism [11] is a platform that allows users to transform unstructured online digital photos into a 3D experience. Nowadays, image sensors are being extensively used to allo...
Fulu Li, James Barabas, Ana L. Santos
CIKM
1999
Springer
14 years 3 months ago
A Comparison of Alternative Continuous Display Techniques with Heterogeneous Multi-Zone Disks
A number of recent technological trends have made data intensive applications such as continuous media audio and video servers a reality. These servers are expected to play an i...
Shahram Ghandeharizadeh, Seon Ho Kim