Sciweavers

890 search results - page 155 / 178
» On the attractiveness of the star network
Sort
View
TJS
2002
144views more  TJS 2002»
13 years 7 months ago
TCP Performance and Behaviors with Local Retransmissions
TCP has been the dominant transport protocol over the global Internet, and its performance over a hybrid wireless/wireline network has attracted much attention in recent years. Thi...
Jianping Pan, Jon W. Mark, Sherman X. Shen
PSD
2010
Springer
154views Database» more  PSD 2010»
13 years 6 months ago
Coprivacy: Towards a Theory of Sustainable Privacy
We introduce the novel concept of coprivacy or co-operative privacy to make privacy preservation attractive. A protocol is coprivate if the best option for a player to preserve her...
Josep Domingo-Ferrer
ACSAC
2010
IEEE
13 years 5 months ago
G-Free: defeating return-oriented programming through gadget-less binaries
Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still repr...
Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide...
CANS
2010
Springer
258views Cryptology» more  CANS 2010»
13 years 5 months ago
Cryptanalysis of Reduced-Round MIBS Block Cipher
Abstract. This paper presents the first independent and systematic linear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at ...
Asli Bay, Jorge Nakahara, Serge Vaudenay
ISCI
2011
13 years 2 months ago
Augmented k-ary n-cubes
We define an interconnection network AQn,k which we call the augmented kary n-cube by extending a k-ary n-cube in a manner analogous to the existing extension of an n-dimensional...
Yonghong Xiang, Iain A. Stewart