Sciweavers

1490 search results - page 244 / 298
» The Logic of Authentication Protocols
Sort
View
ICC
2007
IEEE
14 years 3 months ago
Preventing ARP Attacks Using a Fuzzy-Based Stateful ARP Cache
— ARP cache poisoning is considered to be one of the easiest and dangerous attacks in local area networks. This paper proposes a solution to the ARP poisoning problem by extendin...
Zouheir Trabelsi, Wasim El-Hajj
EDOC
2003
IEEE
14 years 2 months ago
A Model-Driven Transformation Method
Model-driven architectures (MDA) separate the business or application logic from the underlying platform technology and represent this logic with precise semantic models. These mo...
Jana Koehler, Rainer Hauser, Shubir Kapoor, Freder...
HOTOS
2003
IEEE
14 years 2 months ago
FAB: Enterprise Storage Systems on a Shoestring
Abstract—A Federated Array of Bricks (FAB) is a logical disk system that provides the reliability and performance of enterprise-class disk arrays, at a fraction of the cost and w...
Svend Frølund, Arif Merchant, Yasushi Saito...
ARC
2009
Springer
134views Hardware» more  ARC 2009»
14 years 1 months ago
A HyperTransport 3 Physical Layer Interface for FPGAs
Abstract. This paper presents the very first implementation of a HyperTransport 3 physical layer interface for Field Programmable Gate Arrays. HyperTransport is a low latency, high...
Heiner Litz, Holger Fröning, Ulrich Brün...
RTSS
1997
IEEE
14 years 1 months ago
On-the-fly symbolic model checking for real-time systems
This paper presents an on-the-fly and symbolic algorithm for checking whether a timed automaton satisfies a formula of a timed temporal logic which is more expressive than TCTL....
Ahmed Bouajjani, Stavros Tripakis, Sergio Yovine