Sciweavers

4795 search results - page 917 / 959
» The Message Classification Model
Sort
View
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 7 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
CODES
2010
IEEE
13 years 6 months ago
Hardware/software optimization of error detection implementation for real-time embedded systems
This paper presents an approach to system-level optimization of error detection implementation in the context of fault-tolerant realtime distributed embedded systems used for safe...
Adrian Lifa, Petru Eles, Zebo Peng, Viacheslav Izo...
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 4 months ago
Exploiting Temporal Complex Network Metrics in Mobile Malware Containment
Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to the propagation of human and other biological viruses. Recent work has employed m...
John Tang, Cecilia Mascolo, Mirco Musolesi, Vito L...
TIM
2011
123views more  TIM 2011»
13 years 4 months ago
A Distributed Measurement Scheme for Internet Latency Estimation
—Estimating latency between the hosts in the Internet can play a significant role in the improvement of the performance of many services that use latency among hosts to make rout...
Negar Hariri, Behnoosh Hariri, Shervin Shirmohamma...
MICRO
2010
IEEE
202views Hardware» more  MICRO 2010»
13 years 4 months ago
Hardware Support for Relaxed Concurrency Control in Transactional Memory
Today's transactional memory systems implement the two-phase-locking (2PL) algorithm which aborts transactions every time a conflict happens. 2PL is a simple algorithm that pr...
Utku Aydonat, Tarek S. Abdelrahman