Sciweavers

832 search results - page 47 / 167
» Effect of Malicious Synchronization
Sort
View
P2P
2008
IEEE
149views Communications» more  P2P 2008»
14 years 4 months ago
AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems
In open environments, such as mobile peer-to-peer systems, participants may need to access resources from unknown users. A critical security concern in such systems is the access ...
Brent Lagesse, Mohan Kumar, Matthew Wright
WS
2006
ACM
14 years 3 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
HPCA
2002
IEEE
14 years 10 months ago
Improving Value Communication for Thread-Level Speculation
Thread-Level Speculation (TLS) allows us to automatically parallelize general-purpose programs by supporting parallel execution of threads that might not actually be independent. ...
J. Gregory Steffan, Christopher B. Colohan, Antoni...
EUC
2007
Springer
14 years 1 months ago
Parallel Network Intrusion Detection on Reconfigurable Platforms
With the wide adoption of internet into our everyday lives, internet security becomes an important issue. Intrusion detection at the network level is an effective way of stopping m...
Chun Xue, Zili Shao, Meilin Liu, Qingfeng Zhuge, E...
VTC
2008
IEEE
100views Communications» more  VTC 2008»
14 years 4 months ago
Time-Domain Joint Estimation of Fine Symbol Timing Offset and Integer Carrier Frequency Offset
In this paper, we propose an efficient synchronization method to jointly estimate fine symbol timing offset (STO) and integer carrier frequency offset (CFO). The proposed method is...
Tae-Hwan Kim, In-Cheol Park