Sciweavers

718 search results - page 114 / 144
» Operational Semantics of Security Protocols
Sort
View
COMCOM
2004
109views more  COMCOM 2004»
13 years 9 months ago
User-space auto-tuning for TCP flow control in computational grids
With the advent of computational grids, networking performance over the wide-area network (WAN) has become a critical component in the grid infrastructure. Unfortunately, many hig...
Mark K. Gardner, Sunil Thulasidasan, Wu-chun Feng
CONCUR
2004
Springer
14 years 2 months ago
Session Types for Functional Multithreading
We define a language whose type system, incorporating session types, allows complex protocols to be specified by types and verified by static typechecking. A session type, asso...
Vasco Thudichum Vasconcelos, António Ravara...
ICMCS
2007
IEEE
175views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Clicker - An IPTV Remote Control in Your Cell Phone
This paper investigates a novel concept of providing seamless control and portability of an IPTV viewing session. A solution employing a middleware system, a secure hardware token...
Rittwik Jana, Yih-Farn Chen, David C. Gibbon, Yenn...
IEEEARES
2007
IEEE
14 years 3 months ago
Implementing Network Partition-Aware Fault-Tolerant CORBA Systems
— The current standard for Fault-Tolerance in the Common Object Request Broker Architecture (CORBA) does not support network partitioning. However, distributed systems, and those...
Stefan Beyer, Francesc D. Muñoz-Escoí...
CHES
2005
Springer
149views Cryptology» more  CHES 2005»
14 years 2 months ago
Resistance of Randomized Projective Coordinates Against Power Analysis
Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms us...
William Dupuy, Sébastien Kunz-Jacques