Sciweavers

141 search results - page 11 / 29
» Optimal-in-expectation redistribution mechanisms
Sort
View
CASES
2005
ACM
13 years 9 months ago
Architectural support for real-time task scheduling in SMT processors
In Simultaneous Multithreaded (SMT) architectures most hardware resources are shared between threads. This provides a good cost/performance trade-off which renders these architec...
Francisco J. Cazorla, Peter M. W. Knijnenburg, Riz...
PKC
2009
Springer
131views Cryptology» more  PKC 2009»
14 years 8 months ago
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a convenient tool to reduce the amount of trust in authorities in Identity-Bas...
Benoît Libert, Damien Vergnaud
NCA
2007
IEEE
14 years 2 months ago
Dynamic load balancing for network intrusion detection systems based on distributed architectures
Increasing traffic and the necessity of stateful analyses impose strong computational requirements on network intrusion detection systems (NIDS), and motivate the need of distrib...
Mauro Andreolini, Sara Casolari, Michele Colajanni...
NETCOOP
2007
Springer
14 years 2 months ago
Pricing for QoS Provisioning Across Multiple Internet Service Provider Domains
In this paper we introduce a pricing scheme to be employed between a group of Internet service providers (ISPs) and a customer who wishes to initiate a packet flow from a fixed o...
Soheil Saberi, Roland P. Malhamé, Lorne Mas...
KES
2005
Springer
14 years 1 months ago
Zero-Based Code Modulation Technique for Digital Video Fingerprinting
Digital fingerprinting is a technique to protect digital contents from illegal reproduction and redistribution by marking unique information for individual user. A powerful but sim...
In Koo Kang, Hae-Yeoun Lee, Won-Young Yoo, Heung-K...