Sciweavers

2945 search results - page 512 / 589
» Designing and Implementing Malicious Hardware
Sort
View
SACRYPT
2007
Springer
15 years 10 months ago
The Security of the Extended Codebook (XCB) Mode of Operation
Abstract. The XCB mode of operation was outlined in 2004 as a contribution to the IEEE Security in Storage effort, but no security analysis was provided. In this paper, we provide...
David A. McGrew, Scott R. Fluhrer
EUROMICRO
2006
IEEE
15 years 10 months ago
Authentication in Stealth Distributed Hash Tables
Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of ...
Andrew MacQuire, Andrew Brampton, Idris A. Rai, Ni...
GLOBECOM
2006
IEEE
15 years 10 months ago
A New Framework for Indicating Terminal Capabilities in the IP Multimedia Subsystem
The standardization of the IMS as a multi-access network implies that it can be accessed by different classes of terminals. Even at the heart of the same class of terminals (mobile...
Bassam El Saghir, Noël Crespi
ICPADS
2006
IEEE
15 years 10 months ago
Memory and Network Bandwidth Aware Scheduling of Multiprogrammed Workloads on Clusters of SMPs
Symmetric Multiprocessors (SMPs), combined with modern interconnection technologies are commonly used to build cost-effective compute clusters. However, contention among processor...
Evangelos Koukis, Nectarios Koziris
IJCNN
2006
IEEE
15 years 10 months ago
Reinforcement Learning Control for Biped Robot Walking on Uneven Surfaces
— Biped robots based on the concept of (passive) dynamic walking are far simpler than the traditional fullycontrolled walking robots, while achieving a more natural gait and cons...
Shouyi Wang, Jelmer Braaksma, Robert Babuska, Daan...