Sciweavers

912 search results - page 183 / 183
» Techniques for Securing Networks Against Criminal Attacks
Sort
View
RSA
2000
170views more  RSA 2000»
13 years 10 months ago
Delayed path coupling and generating random permutations
We analyze various stochastic processes for generating permutations almost uniformly at random in distributed and parallel systems. All our protocols are simple, elegant and are b...
Artur Czumaj, Miroslaw Kutylowski
ICFEM
2009
Springer
14 years 5 months ago
Combining Static Model Checking with Dynamic Enforcement Using the Statecall Policy Language
Internet protocols encapsulate a significant amount of state, making implementing the host software complex. In this paper, we define the Statecall Policy Language (SPL) which pr...
Anil Madhavapeddy