Sciweavers

1653 search results - page 204 / 331
» Timed analysis of security protocols
Sort
View
FCCM
2000
IEEE
148views VLSI» more  FCCM 2000»
14 years 2 months ago
An Adaptive Cryptographic Engine for IPSec Architectures
Architectures that implement the Internet Protocol Security (IPSec) standard have to meet the enormous computing demands of cryptographic algorithms. In addition, IPSec architectu...
Andreas Dandalis, Viktor K. Prasanna, José ...
SIGMETRICS
2011
ACM
237views Hardware» more  SIGMETRICS 2011»
13 years 28 days ago
Analysis of DCTCP: stability, convergence, and fairness
Cloud computing, social networking and information networks (for search, news feeds, etc) are driving interest in the deployment of large data centers. TCP is the dominant Layer 3...
Mohammad Alizadeh, Adel Javanmard, Balaji Prabhaka...
CJ
2010
150views more  CJ 2010»
13 years 7 months ago
Program Analysis Probably Counts
Abstract. Semantics-based program analysis uses an abstract semantics of programs/systems to statically determine run-time properties. Classic examples from compiler technology inc...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
ICASSP
2010
IEEE
13 years 10 months ago
Improved Internet traffic analysis via optimized sampling
Applications to evaluate Internet quality-of-service and increase network security are essential to maintaining reliability and high performance in computer networks. These applic...
Sean McPherson, Antonio Ortega
EMSOFT
2006
Springer
14 years 1 months ago
An analysis framework for network-code programs
Distributed real-time systems require a predictable and verifiable mechanism to control the communication medium. Current real-time communication protocols are typically independe...
Madhukar Anand, Sebastian Fischmeister, Insup Lee