Sciweavers

4983 search results - page 785 / 997
» order 2008
Sort
View
CCS
2008
ACM
15 years 6 months ago
A fast real-time memory authentication protocol
We propose a new real-time authentication scheme for memory. As in previous proposals the scheme uses a Merkle tree to guarantee dynamic protection of memory. We use the universal...
Yin Hu, Ghaith Hammouri, Berk Sunar
CDC
2008
IEEE
186views Control Systems» more  CDC 2008»
15 years 6 months ago
A mathematical model of the Skype VoIP congestion control algorithm
The Internet is changing from being only an efficient platform for data delivery to become also a platform for audio/video applications. The stability of the traditional Internet i...
Luca De Cicco, Saverio Mascolo, Vittorio Palmisano
CEAS
2008
Springer
15 years 6 months ago
Toward a stochastic speech act model of email behavior
Human interpersonal face-to-face interaction can be considered in terms of successions of speech acts. These are utterances which contain an intention, and the act of creating an ...
John Mildinhall, Jan Noyes
173
Voted
CF
2008
ACM
15 years 6 months ago
Multi-terabit ip lookup using parallel bidirectional pipelines
To meet growing terabit link rates, highly parallel and scalable architectures are needed for IP lookup engines in next generation routers. This paper proposes an SRAM-based multi...
Weirong Jiang, Viktor K. Prasanna
CHES
2008
Springer
151views Cryptology» more  CHES 2008»
15 years 6 months ago
Binary Edwards Curves
Abstract. This paper presents a new shape for ordinary elliptic curves over fields of characteristic 2. Using the new shape, this paper presents the first complete addition formula...
Daniel J. Bernstein, Tanja Lange, Reza Rezaeian Fa...