Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
This paper presents an overview of the verication framework ALICE in its current version 0.7. It is based on the generic theorem prover Isabelle [Pau03a]. Within ALICE a software o...
-- In this paper we analyze P2P live streaming systems. Through this analysis we obtain the crucial parameters for their performance in terms of bandwidth utilization, set-up time,...
We evaluate and compare the performance of three P2P streaming systems that are capable of streaming live video on the Internet by testing them on a carefully controlled, traffic...
Sachin Agarwal, Jatinder Pal Singh, Aditya Mavlank...
The design and operation of long-lived, sustainable systems (LSS) are hampered by limited support for change over time and limited preservation of system knowledge. The solution we...
Robyn R. Lutz, David Weiss, Sandeep Krishnan, Jing...