Sciweavers

1508 search results - page 230 / 302
» Efficient Path Profiling
Sort
View
DCOSS
2010
Springer
14 years 5 days ago
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
Tassos Dimitriou, Thanassis Giannetsos
NSDI
2008
13 years 11 months ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
ICA3PP
2010
Springer
13 years 10 months ago
Function Units Sharing between Neighbor Cores in CMP
Abstract. Program behaviors reveal that programs have different sources requirement at different phases, even at continuous clocks. It is not a reasonable way to run different prog...
Tianzhou Chen, Jianliang Ma, Hui Yuan, Jingwei Liu...
PTS
2008
165views Hardware» more  PTS 2008»
13 years 10 months ago
Test Plan Generation for Concurrent Real-Time Systems Based on Zone Coverage Analysis
The state space explosion due to concurrency and timing constraints of concurrent real-time systems (CRTS) presents significant challenges to the verification engineers. In this pa...
Farn Wang, Geng-Dian Huang
SDM
2008
SIAM
129views Data Mining» more  SDM 2008»
13 years 10 months ago
Statistical Density Prediction in Traffic Networks
Recently, modern tracking methods started to allow capturing the position of massive numbers of moving objects. Given this information, it is possible to analyze and predict the t...
Hans-Peter Kriegel, Matthias Renz, Matthias Schube...