Sciweavers

494 search results - page 89 / 99
» Design, implementation and evaluation of a QoS-aware transpo...
Sort
View
ASYNC
2005
IEEE
174views Hardware» more  ASYNC 2005»
14 years 1 months ago
Delay Insensitive Encoding and Power Analysis: A Balancing Act
Unprotected cryptographic hardware is vulnerable to a side-channel attack known as Differential Power Analysis (DPA). This attack exploits data-dependent power consumption of a co...
Konrad J. Kulikowski, Ming Su, Alexander B. Smirno...
ICNP
2005
IEEE
14 years 1 months ago
CONNET: Self-Controlled Access Links for Delay and Jitter Requirements
Access links are typically the bottleneck between a high bandwidth LAN and a high bandwidth IP network. Without a priori resource provisioning or reservation, this tends to have a...
Mohamed A. El-Gendy, Kang G. Shin, Hosam Fathy
ICNP
2005
IEEE
14 years 1 months ago
Exploiting Dynamic Querying like Flooding Techniques in Unstructured Peer-to-Peer Networks
In unstructured peer-to-peer networks, controlled flooding aims at locating an item at the minimum message cost. Dynamic querying is a new controlled flooding technique. While i...
Hongbo Jiang, Shudong Jin
XIMEP
2005
ACM
106views Database» more  XIMEP 2005»
14 years 1 months ago
Combining a Publish and Subscribe Collaboration Architecture with XQuery Approaches
Markup languages, representations, schemas, and tools have significantly increased the ability for organizations to share their information. Languages such as the Extensible Marku...
M. Brian Blake, David H. Fado, Gregory A. Mack
IPPS
2003
IEEE
14 years 1 months ago
Dynamic Resource Discovery for Applications Survivability in Distributed Real-Time Systems
In this paper we propose a new resource discovery protocol, REALTOR, which is based on a combination of pullbased and push-based resource information dissemination. REALTOR has be...
Byung-Kyu Choi, Sangig Rho, Riccardo Bettati