Sciweavers

446 search results - page 35 / 90
» SP-to-SP service ordering specification and its implementati...
Sort
View
RTAS
2005
IEEE
14 years 1 months ago
Timing Analysis of TCP Servers for Surviving Denial-of-Service Attacks
— Denial-of-service attacks are becoming more frequent and sophisticated. Researchers have proposed a variety of defenses, including better system configurations, infrastructure...
V. Krishna Nandivada, Jens Palsberg
DATE
2008
IEEE
82views Hardware» more  DATE 2008»
14 years 2 months ago
A Triple-Mode Reconfigurable Sigma-Delta Modulator for Multi-Standard Wireless Applications
This paper presents the implementation and experimental characterization of a reconfigurable ΣΔ modulator intended for multi-mode wireless receivers that is capable to perform t...
Alonso Morgado, Rocio del Río, José ...
CCS
2010
ACM
13 years 8 months ago
On the (in)security of IPsec in MAC-then-encrypt configurations
IPsec allows a huge amount of flexibility in the ways in which its component cryptographic mechanisms can be combined to build a secure communications service. This may be good fo...
Jean Paul Degabriele, Kenneth G. Paterson
ECWEB
2005
Springer
136views ECommerce» more  ECWEB 2005»
14 years 1 months ago
Music Rights Clearance Business Analysis and Delivery
Abstract. Semantic Web Services can be seen as remote Problem Solving Methods offered via the Web through platform and language independent interfaces. They can be seamlessly inte...
Carlos Pedrinaci, Ziv Baida, Hans Akkermans, Amaia...
BIRTHDAY
2010
Springer
13 years 8 months ago
Model Checking Programmable Router Configurations
Programmable networks offer the ability to customize router behaviour at run time, thus providing new levels of flexibility for network administrators. We have developed a program...
Luca Zanolin, Cecilia Mascolo, Wolfgang Emmerich