Sciweavers

316 search results - page 47 / 64
» Where do security policies come from
Sort
View
PVM
2009
Springer
14 years 2 months ago
Hierarchical Collectives in MPICH2
Abstract. Most parallel systems on which MPI is used are now hierarchical: some processors are much closer to others in terms of interconnect performance. One of the most common su...
Hao Zhu, David Goodell, William Gropp, Rajeev Thak...
CDC
2009
IEEE
133views Control Systems» more  CDC 2009»
14 years 6 days ago
A symbolic model approach to the digital control of nonlinear time-delay systems
— In this paper we propose an approach to control design of nonlinear time–delay systems, which is based on the construction of symbolic models, where each symbolic state and e...
Giordano Pola, Pierdomenico Pepe, Maria Domenica D...
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
13 years 7 months ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...
ICC
2009
IEEE
100views Communications» more  ICC 2009»
14 years 2 months ago
Pollution Resilience for DNS Resolvers
Abstract—The DNS is a cornerstone of the Internet. Unfortunately, no matter how securely an organization provisions and guards its own DNS infrastructure, it is at the mercy of o...
Andrew J. Kalafut, Minaxi Gupta
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...