Sciweavers

373 search results - page 45 / 75
» Virtual Power Limiter System which Guarantees Stability of C...
Sort
View
CASES
2010
ACM
13 years 6 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
IJVR
2008
125views more  IJVR 2008»
13 years 8 months ago
Intelligent Mobile Agents for Large-Scale Collaborative Virtual Environment
The Web3D technologies make it possible to create Collaborative Virtual Environment (CVE) in the popular Internet, thus promoting the popularity of CVE scientific applications to b...
Qingping Lin, Liang Zhang, Sun Ding, Guorui Feng, ...
FAST
2009
13 years 6 months ago
PARDA: Proportional Allocation of Resources for Distributed Storage Access
Rapid adoption of virtualization technologies has led to increased utilization of physical resources, which are multiplexed among numerous workloads with varying demands and impor...
Ajay Gulati, Irfan Ahmad, Carl A. Waldspurger
CONCUR
2008
Springer
13 years 10 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
CDC
2008
IEEE
162views Control Systems» more  CDC 2008»
14 years 3 months ago
Synchronization in networks of nonlinear oscillators with coupling delays
Abstract— We consider the synchronization problem of an arbitrary number of coupled nonlinear oscillators with delays in the interconnections. The emphasis is on coupled Lorenz s...
Wim Michiels, Henk Nijmeijer