Sciweavers

2255 search results - page 402 / 451
» High Assurance Software Systems
Sort
View
MATA
2001
Springer
14 years 3 months ago
Multipoint-to-Point Routing with QoS Guarantees Using Mobile Agents
To overcome the shortcomings of existing IP networks and to facilitate the overall quality-of-service (QoS) provisioning in the near-future networks, new technologies such as Multi...
Sergio González-Valenzuela, Victor C. M. Le...
IPPS
1998
IEEE
14 years 3 months ago
Update Protocols and Iterative Scientific Applications
Software DSMs have been a research topic for over a decade. While good performance has been achieved in some cases, consistent performance has continued to elude researchers. This...
Peter J. Keleher
ASIACRYPT
2009
Springer
14 years 2 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
CCS
2008
ACM
14 years 1 months ago
A fast real-time memory authentication protocol
We propose a new real-time authentication scheme for memory. As in previous proposals the scheme uses a Merkle tree to guarantee dynamic protection of memory. We use the universal...
Yin Hu, Ghaith Hammouri, Berk Sunar
FPL
2008
Springer
111views Hardware» more  FPL 2008»
14 years 17 days ago
Sampling from the exponential distribution using independent Bernoulli variates
The exponential distribution is a key distribution in many event-driven Monte-Carlo simulations, where it is used to model the time between random events in the system. This paper...
David B. Thomas, Wayne Luk