Sciweavers

334 search results - page 51 / 67
» Inapproximability of Survivable Networks
Sort
View
ECAL
2007
Springer
14 years 2 months ago
The Evolution of Pain
We describe two simple simulations in which artificial organisms evolve an ability to respond to inputs from within their own body and these inputs themselves can evolve. In the fi...
Alberto Acerbi, Domenico Parisi
IJNSEC
2008
166views more  IJNSEC 2008»
13 years 8 months ago
Countermeasures for Hardware Fault Attack in Multi-Prime RSA Cryptosystems
The study of countermeasures for hardware fault attack in multi-prime RSA cryptosystems is very important for applications such as computer network and smart cards. In this paper,...
Zine-Eddine Abid, Wei Wang
ISSE
2006
13 years 8 months ago
Modeling security as a dependability attribute: a refinement-based approach
Abstract As distributed, networked computing systems become the dominant computing platform in a growing range of applications, they increase opportunities for security violations ...
Ali Mili, Frederick T. Sheldon, Lamia Labed Jilani...
GLOBECOM
2010
IEEE
13 years 6 months ago
Correlation-Resilient Path Selection in Multi-Path Routing
Multi-path routing is effective to enhance network availability, by selecting multiple failure-independent paths for reaching one destination in the hope to survive individual pat...
Xin Zhang, Adrian Perrig
ICC
2007
IEEE
146views Communications» more  ICC 2007»
14 years 2 months ago
A Delay-Constrained Shared Mesh Restoration Scheme
—We present a multi-constrained routing algorithm, called Delay-constrained Pool Sharing (DPS), in a survivable mesh network. The goal of this algorithm is to find a pair of link...
Hassan Naser, Ming Gong