Sciweavers

1626 search results - page 295 / 326
» Connections in Networks: A Hybrid Approach
Sort
View
ACSAC
1998
IEEE
14 years 28 days ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron
ICCD
2007
IEEE
152views Hardware» more  ICCD 2007»
14 years 15 days ago
Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors
As application-specific instruction set processors (ASIPs) are being increasingly used in mobile embedded systems, the ubiquitous networking connections have exposed these systems...
Hai Lin, Xuan Guan, Yunsi Fei, Zhijie Jerry Shi
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
14 years 11 days ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
WSC
1998
13 years 10 months ago
Informational Macrodynamics: System Modelling and Simulation Methodologies
Informational Macrodynamics (IMD) presents a unified informational systemic approach with common information language for modeling, analysis and optimization of a variety of inter...
Vladimir S. Lerner
AISS
2010
112views more  AISS 2010»
13 years 6 months ago
A QoS-based P2P Streaming for Ubiquitous Personal IPTV
In this paper, a P2P(Peer-to-Peer) streaming approach is proposed for the implementation of ubiquitous personal IPTV systems which allow any Internet users with proper network con...
Seungchul Park