Sciweavers

15 search results - page 1 / 3
» nca 2009
Sort
View
114
Voted
NCA
2009
IEEE
15 years 10 months ago
Optimizations of Large Receive Offload in Xen
Fumio Nakanjima, Hitoshi Oi
93
Voted
NCA
2009
IEEE
15 years 10 months ago
TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory
Xiaokang Xiong, Duncan S. Wong, Xiaotie Deng
142
Voted
APPROX
2009
Springer
195views Algorithms» more  APPROX 2009»
15 years 10 months ago
Approximating Node-Connectivity Augmentation Problems
The (undirected) Node Connectivity Augmentation (NCA) problem is: given a graph J = (V, EJ ) and connectivity requirements {r(u, v) : u, v ∈ V }, find a minimum size set I of n...
Zeev Nutov
128
Voted
NCA
2009
IEEE
15 years 10 months ago
From Auto-adaptive to Survivable and Self-Regenerative Systems
—This paper charts the course of adaptive behavior in intrusion tolerance, starting from pre-programmed and usercontrolled reactive adaptation to highly sophisticated autonomic a...
Michael Atighetchi, Partha Pratim Pal
124
Voted
NCA
2009
IEEE
15 years 10 months ago
Attribute-Based Prevention of Phishing Attacks
Abstract—This paper describes a set of innovative attributebased checks for defending against phishing attacks1 . We explain a number of anti-phishing algorithms implemented as p...
Michael Atighetchi, Partha Pratim Pal