Sciweavers

858 search results - page 56 / 172
» On the Salsa20 Core Function
Sort
View
IM
2007
13 years 9 months ago
Pursuit-Evasion in Models of Complex Networks
Vertex pursuit games, such as the game of Cops and Robbers, are a simplified model for network security. In these games, cops try to capture a robber loose on the vertices of the ...
Anthony Bonato, Pawel Pralat, Changping Wang
JHSN
2007
104views more  JHSN 2007»
13 years 9 months ago
Optical burst switching network: A multi-layered approach
This paper defines a new multi-layered architecture for supporting optical burst switching (OBS) in an optical core network. The architecture takes into account both the control p...
Farid Farahmand, Vinod Vokkarane, Jason P. Jue, Jo...
ARESEC
2011
117views more  ARESEC 2011»
12 years 9 months ago
Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots
—Denial of Service (DoS) attacks aiming to exhaust the resources of a server by overwhelming it with bogus requests have become a serious threat. Especially protocols that rely o...
Yves Igor Jerschow, Martin Mauve
HASKELL
2009
ACM
14 years 3 months ago
Types are calling conventions
It is common for compilers to derive the calling convention of a function from its type. Doing so is simple and modular but misses many optimisation opportunities, particularly in...
Maximilian C. Bolingbroke, Simon L. Peyton Jones
IPPS
2007
IEEE
14 years 3 months ago
A CAM Emulator Using Look-Up Table Cascades
An address table relates k different registered vectors to the addresses from 1 to k. An address generation function represents the address table. This paper presents a realizatio...
Hiroki Nakahara, Tsutomu Sasao, Munehiro Matsuura