Sciweavers

2958 search results - page 180 / 592
» Extending and Implementing RASP
Sort
View

Publication
145views
13 years 6 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
NFM
2011
306views Formal Methods» more  NFM 2011»
13 years 5 months ago
Generalized Rabin(1) Synthesis with Applications to Robust System Synthesis
Synthesis of finite-state machines from linear-time temporal logic (LTL) formulas is an important formal specification debugging technique for reactive systems and can quickly ge...
Rüdiger Ehlers
SCP
2011
228views Communications» more  SCP 2011»
13 years 5 months ago
Channel-based coordination via constraint satisfaction
Coordination in Reo emerges from the composition of the behavioural constraints of primitives, such as channels, in a component connector. Understanding and implementing Reo, howe...
Dave Clarke, José Proença, Alexander...
IJNSEC
2010
324views more  IJNSEC 2010»
13 years 5 months ago
Computing the Modular Inverse of a Polynomial Function over GF(2P) Using Bit Wise Operation
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
Rajaram Ramasamy, Amutha Prabakar Muniyandi

Publication
819views
15 years 10 months ago
Continuous Query Processing of Spatio-temporal Data Streams in PLACE
The tremendous increase in the use of cellular phones, GPS-like devices, and RFIDs results in highly dynamic environments where objects as well as queries are continuously moving. ...
Mohamed F. Mokbel, Xiaopeng Xiong, Moustafa A. Ham...