Sciweavers

175 search results - page 19 / 35
» Password policy simulation and analysis
Sort
View
ICRA
2003
IEEE
128views Robotics» more  ICRA 2003»
15 years 8 months ago
Avoiding unsafe states in manufacturing systems based on polynomial digraph algorithms
Abstract − A deadlock-free unsafe (DFU) state of Resource Allocation System (RAS) is deadlock-free but inevitable to enter a deadlock state. Previous research revealed that in ma...
Yin Wang, Zhiming Wu
INFOCOM
2012
IEEE
13 years 5 months ago
Delay and rate-optimal control in a multi-class priority queue with adjustable service rates
—We study two convex optimization problems in a multi-class M/G/1 queue with adjustable service rates: minimizing convex functions of the average delay vector, and minimizing ave...
Chih-Ping Li, Michael J. Neely
111
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Defending Against Attacks on Main Memory Persistence
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
William Enck, Kevin R. B. Butler, Thomas Richardso...
TON
2008
155views more  TON 2008»
15 years 3 months ago
A comparative analysis of server selection in content replication networks
Server selection plays an essential role in content replication networks, such as peer-to-peer (P2P) and content delivery networks (CDNs). In this paper, we perform an analytical i...
Tao Wu, David Starobinski
INFOCOM
2007
IEEE
15 years 9 months ago
Two-Tier Load Balancing in OSPF Wireless Back-Hauls
Abstract— High-speed wireless communication technology (e.g. WiMAX) makes it feasible and cost-effective to build wireless back-hauls for Internet access. Compared to wired count...
Xiaowen Zhang, Hao Zhu