Sciweavers

483 search results - page 63 / 97
» Patterns of Protocols
Sort
View
NCA
2008
IEEE
14 years 2 months ago
Finite Memory: A Vulnerability of Intrusion-Tolerant Systems
In environments like the Internet, faults follow unusual patterns, dictated by the combination of malicious attacks with accidental faults such as long communication delays caused...
Giuliana Santos Veronese, Miguel Correia, Lau Cheu...
QSIC
2005
IEEE
14 years 1 months ago
Towards Making Agent UML Practical: A Textual Notation and a Tool
Design notations play an important role in designing software. Agent UML (AUML), which extends the widelyused UML notation, has proposed a number of notations for modelling agent ...
Michael Winikoff
SC
2003
ACM
14 years 1 months ago
BCS-MPI: A New Approach in the System Software Design for Large-Scale Parallel Computers
Buffered CoScheduled MPI (BCS-MPI) introduces a new approach to design the communication layer for largescale parallel machines. The emphasis of BCS-MPI is on the global coordinat...
Juan Fernández, Eitan Frachtenberg, Fabrizi...
ACNS
2010
Springer
150views Cryptology» more  ACNS 2010»
14 years 16 days ago
Regulatory Compliant Oblivious RAM
Abstract. We introduce WORM-ORAM, a first mechanism that combines Oblivious RAM (ORAM) access privacy and data confidentiality with Write Once Read Many (WORM) regulatory data re...
Bogdan Carbunar, Radu Sion
AINA
2007
IEEE
13 years 11 months ago
Towards Integrated Services for Health Monitoring
The emergence of short-range wireless communications hold the promise of realizing the grand vision of the next generation communication networks in which devices follow a always ...
Chunming Rong, Hein Meling, Dagfinn Waage