Sciweavers

1236 search results - page 118 / 248
» fast 2010
Sort
View
TRUSTBUS
2010
Springer
15 years 1 months ago
Safe and Efficient Strategies for Updating Firewall Policies
Abstract. Due to the large size and complex structure of modern networks, firewall policies can contain several thousand rules. The size and complexity of these policies require au...
Zeeshan Ahmed, Abdessamad Imine, Michaël Rusi...
149
Voted
CORR
2010
Springer
184views Education» more  CORR 2010»
15 years 3 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
144
Voted
CORR
2010
Springer
170views Education» more  CORR 2010»
15 years 4 months ago
Slow Adaptive OFDMA Systems Through Chance Constrained Programming
Adaptive orthogonal frequency division multiple access (OFDMA) has recently been recognized as a promising technique for providing high spectral efficiency in future broadband wire...
William Weiliang Li, Ying Jun Zhang, Anthony Man-C...
PADL
2010
Springer
16 years 25 days ago
Conversion by Evaluation
Abstract. We show how testing convertibility of two types in dependently typed systems can advantageously be implemented instead untyped normalization by evaluation, thereby reusin...
Mathieu Boespflug
126
Voted
PADL
2010
Springer
16 years 25 days ago
Static Detection of Race Conditions in Erlang
Abstract. We address the problem of detecting some commonly occurring kinds of race conditions in Erlang programs using static analysis. Our analysis is completely automatic, fast ...
Maria Christakis, Konstantinos F. Sagonas