Sciweavers

1116 search results - page 183 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Respondent-Driven Sampling for Characterizing Unstructured Overlays
—This paper presents Respondent-Driven Sampling (RDS) as a promising technique to derive unbiased estimates of node properties in unstructured overlay networks such as Gnutella. ...
Amir Hassan Rasti, Mojtaba Torkjazi, Reza Rejaie, ...
INFOCOM
2009
IEEE
14 years 2 months ago
Power-Aware Speed Scaling in Processor Sharing Systems
—Energy use of computer communication systems has quickly become a vital design consideration. One effective method for reducing energy consumption is dynamic speed scaling, whic...
Adam Wierman, Lachlan L. H. Andrew, Ao Tang
ACSAC
2008
IEEE
14 years 2 months ago
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
A new class of stealthy kernel-level malware, called transient kernel control flow attacks, uses dynamic soft timers to achieve significant work while avoiding any persistent ch...
Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calt...
IROS
2007
IEEE
85views Robotics» more  IROS 2007»
14 years 2 months ago
Electrostatic latching for inter-module adhesion, power transfer, and communication in modular robots
— A simple and robust inter-module latch is possibly the most important component of a modular robotic system. This paper describes a latch based on electric fields and capaciti...
Mustafa Emre Karagozler, Jason Campbell, Gary K. F...
UIST
2005
ACM
14 years 1 months ago
Artistic resizing: a technique for rich scale-sensitive vector graphics
When involved in the visual design of graphical user interfaces, graphic designers can do more than providing static graphics for programmers to incorporate into applications. We ...
Pierre Dragicevic, Stéphane Chatty, David T...