Sciweavers

516 search results - page 42 / 104
» Comparing Two Information Flow Security Properties
Sort
View
ICC
2007
IEEE
120views Communications» more  ICC 2007»
14 years 3 months ago
Fixed-Period Packet Sampling and its Application to Flow Rate Estimation
Abstract— We propose a packet sampling strategy called fixedperiod sampling, which selects at most one packet in every fixedlength period. Under the fixed-period sampling, the...
Sadayoshi Ito, Kousuke Uchiyama, Shigeo Shioda
VIS
2004
IEEE
131views Visualization» more  VIS 2004»
14 years 10 months ago
Visualization of Intricate Flow Structures for Vortex Breakdown Analysis
Vortex breakdowns and flow recirculation are essential phenomena in aeronautics where they appear as a limiting factor in the design of modern aircrafts. Because of the inherent i...
Charles D. Hansen, Christoph Garth, Eduard Deines,...
NBIS
2009
Springer
14 years 3 months ago
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah A...
DATE
2004
IEEE
129views Hardware» more  DATE 2004»
14 years 18 days ago
On the Design and Verification Methodology of the Look-Aside Interface
In this paper, we present a technique to design and verify the Look-Aside (LA-1) Interface standard used in network processors. Our design flow includes several refinements starti...
Ali Habibi, Asif Iqbal Ahmed, Otmane Aït Moha...
ESWS
2009
Springer
14 years 3 months ago
Middleware for Automated Implementation of Security Protocols
We propose a middleware for automated implementation of security protocols for Web services. The proposed middleware consists of two main layers: the communication layer and the se...
Béla Genge, Piroska Haller