Sciweavers

83 search results - page 16 / 17
» From Key Predistribution to Key Redistribution
Sort
View
MOBICOM
2004
ACM
14 years 10 days ago
A scalable model for channel access protocols in multihop ad hoc networks
A new modeling framework is introduced for the analytical study of medium access control (MAC) protocols operating in multihop ad hoc networks. The model takes into account the eļ...
Marcelo M. Carvalho, Jose Joaquin Garcia-Luna-Acev...
WS
2004
ACM
14 years 10 days ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
ISCA
2010
IEEE
219views Hardware» more  ISCA 2010»
14 years 47 min ago
Using hardware vulnerability factors to enhance AVF analysis
Fault tolerance is now a primary design constraint for all major microprocessors. One step in determining a processorā€™s compliance to its failure rate target is measuring the Ar...
Vilas Sridharan, David R. Kaeli
CODES
2007
IEEE
13 years 11 months ago
A computational reflection mechanism to support platform debugging in SystemC
System-level and Platform-based design, along with Transaction Level modeling (TLM) techniques and languages like SystemC, appeared as a response to the ever increasing complexity...
Bruno Albertini, Sandro Rigo, Guido Araujo, Cristi...
ATAL
2006
Springer
13 years 10 months ago
Accident or intention: that is the question (in the Noisy Iterated Prisoner's Dilemma)
This paper focuses on the Noisy Iterated Prisoner's Dilemma, a version of the Iterated Prisoner's Dilemma (IPD) in which there is a nonzero probability that a "coop...
Tsz-Chiu Au, Dana S. Nau