Sciweavers

1503 search results - page 238 / 301
» Device Independence and the Web
Sort
View
WS
2006
ACM
14 years 2 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
SAGA
2005
Springer
14 years 2 months ago
Self-replication, Evolvability and Asynchronicity in Stochastic Worlds
We consider temporal aspects of self-replication and evolvability – in particular, the massively asynchronous parallel and distributed nature of living systems. Formal views of s...
Chrystopher L. Nehaniv
EUROCRYPT
2010
Springer
14 years 1 months ago
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
Abstract. Physical computational devices leak side-channel information that may, and often does, reveal secret internal states. We present a general transformation that compiles an...
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tr...
MM
1997
ACM
131views Multimedia» more  MM 1997»
14 years 1 months ago
Continuous Display Using Heterogeneous Disk-Subsystems
A number of recent technological trends have made data intensive applications such as continuous media (audio and video) servers a reality. These servers store and retrieve a larg...
Roger Zimmermann, Shahram Ghandeharizadeh
USENIX
2008
13 years 11 months ago
Bridging the Gap between Software and Hardware Techniques for I/O Virtualization
: The paravirtualized I/O driver domain model, used in Xen, provides several advantages including device driver isolation in a safe execution environment, support for guest VM tran...
Jose Renato Santos, Yoshio Turner, G. John Janakir...