Sciweavers

2081 search results - page 280 / 417
» Chaotic Systems Synchronization in Secure Communication Syst...
Sort
View
SIGSOFT
2010
ACM
13 years 5 months ago
Multiplicity computing: a vision of software engineering for next-generation computing platform applications
New technologies have recently emerged to challenge the very nature of computing: multicore processors, virtualized operating systems and networks, and data-center clouds. One can...
Cristian Cadar, Peter Pietzuch, Alexander L. Wolf
SIGCOMM
2009
ACM
14 years 2 months ago
Crossbow: from hardware virtualized NICs to virtualized networks
This paper describes a new architecture for achieving network virtualization using virtual NICs (VNICs) as the building blocks. The VNICs can be associated with dedicated and inde...
Sunay Tripathi, Nicolas Droux, Thirumalai Srinivas...
SACMAT
2006
ACM
14 years 2 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
VTC
2006
IEEE
105views Communications» more  VTC 2006»
14 years 2 months ago
Iterative Equalization and Decoding for Unsynchronized OFDMA Uplink Transmissions
— For the uplink transmission of a coded OFDMA system, we present an iterative receiver that performs joint frequency offset acquisition, channel estimation and maximum a posteri...
Man-On Pun, Michele Morelli, C. C. Jay Kuo
SAC
2006
ACM
14 years 2 months ago
Revisiting 1-copy equivalence in clustered databases
Recently renewed interest in scalable database systems for shared nothing clusters has been supported by replication protocols based on group communication that are aimed at seaml...
Rui Carlos Oliveira, José Pereira, Alfr&aci...