Sciweavers

31 search results - page 6 / 7
» Detection of Global Predicates: Techniques and Their Limitat...
Sort
View
TON
2008
121views more  TON 2008»
13 years 6 months ago
A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks
Many multicast overlay networks maintain application-specific performance goals by dynamically adapting the overlay structure when the monitored performance becomes inadequate. Thi...
Aaron Walters, David Zage, Cristina Nita-Rotaru
JGS
2006
113views more  JGS 2006»
13 years 7 months ago
Pattern based map comparisons
Map comparison techniques based on a pixel-by-pixel comparison are useful for many purposes, but fail to reveal important aspects of map similarities and differences. In contrast, ...
Roger White
ISCA
2009
IEEE
158views Hardware» more  ISCA 2009»
14 years 1 months ago
Boosting single-thread performance in multi-core systems through fine-grain multi-threading
Industry has shifted towards multi-core designs as we have hit the memory and power walls. However, single thread performance remains of paramount importance since some applicatio...
Carlos Madriles, Pedro López, Josep M. Codi...
RTCSA
1999
IEEE
13 years 11 months ago
A Symbolic Model Checker for Testing ASTRAL Real-Time Specifications
ASTRAL is a high-level formal specification language for real-time (infinite state) systems. It is provided with structuring mechanisms that allow one to build modularized specifi...
Zhe Dang, Richard A. Kemmerer
ESORICS
2010
Springer
13 years 8 months ago
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation
Abstract. We introduce a novel remotely-mounted attack that can expose the network identity of an anonymous client, hidden service, and anonymizing proxies. To achieve this, we emp...
Sambuddho Chakravarty, Angelos Stavrou, Angelos D....