Sciweavers

233 search results - page 23 / 47
» Computationally feasible VCG mechanisms
Sort
View
DFT
2007
IEEE
103views VLSI» more  DFT 2007»
14 years 3 months ago
Lazy Error Detection for Microprocessor Functional Units
We propose and evaluate the use of lazy error detection for a superscalar, out-of-order microprocessor’s functional units. The key insight is that error detection is off the cri...
Mahmut Yilmaz, Albert Meixner, Sule Ozev, Daniel J...
ICDCSW
2007
IEEE
14 years 2 months ago
Exploring Symmetric Cryptography for Secure Network Reprogramming
Recent secure code-update protocols for sensor networks have been based on asymmetric-crypto primitives such as digital signatures. Our approach, Castor, explores the feasibility ...
Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan
NDSS
2007
IEEE
14 years 2 months ago
Army of Botnets
The trend toward smaller botnets may be more dangerous than large botnets, in terms of large-scale attacks like distributed denials of service. We examine the possibility of “su...
Ryan Vogt, John Aycock, Michael J. Jacobson Jr.
SKG
2006
IEEE
14 years 2 months ago
An Extended OCSP Protocol for Grid CA Cross-certification
In grid environment, there are many administrative domains, each domain has its own CA, and entities in different domains need authentication when accessing each other. The OCSP (...
Shaomin Zhang, Huitao Gong, Baoyi Wang
CONEXT
2006
ACM
14 years 2 months ago
Understanding the behavior of TCP for real-time CBR workloads
In this paper, we examine the feasibility of sending real-time CBR workloads over TCP. This is motivated by the friendliness of NATs and firewalls towards TCP as opposed to UDP a...
Salman Baset, Eli Brosh, Vishal Misra, Dan Rubenst...