Sciweavers

516 search results - page 42 / 104
» Comparing Two Information Flow Security Properties
Sort
View
103
Voted
ICC
2007
IEEE
120views Communications» more  ICC 2007»
15 years 9 months ago
Fixed-Period Packet Sampling and its Application to Flow Rate Estimation
Abstract— We propose a packet sampling strategy called fixedperiod sampling, which selects at most one packet in every fixedlength period. Under the fixed-period sampling, the...
Sadayoshi Ito, Kousuke Uchiyama, Shigeo Shioda
139
Voted
VIS
2004
IEEE
131views Visualization» more  VIS 2004»
16 years 3 months ago
Visualization of Intricate Flow Structures for Vortex Breakdown Analysis
Vortex breakdowns and flow recirculation are essential phenomena in aeronautics where they appear as a limiting factor in the design of modern aircrafts. Because of the inherent i...
Charles D. Hansen, Christoph Garth, Eduard Deines,...
132
Voted
NBIS
2009
Springer
15 years 9 months ago
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah A...
113
Voted
DATE
2004
IEEE
129views Hardware» more  DATE 2004»
15 years 6 months ago
On the Design and Verification Methodology of the Look-Aside Interface
In this paper, we present a technique to design and verify the Look-Aside (LA-1) Interface standard used in network processors. Our design flow includes several refinements starti...
Ali Habibi, Asif Iqbal Ahmed, Otmane Aït Moha...
134
Voted
ESWS
2009
Springer
15 years 9 months ago
Middleware for Automated Implementation of Security Protocols
We propose a middleware for automated implementation of security protocols for Web services. The proposed middleware consists of two main layers: the communication layer and the se...
Béla Genge, Piroska Haller