Sciweavers

3089 search results - page 417 / 618
» services 2008
Sort
View
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
15 years 10 months ago
Analysis of EAP-GPSK Authentication Protocol
Abstract. The EAP-GPSK protocol is a lightweight, flexible authentication protocol relying on symmetric key cryptography. It is part of an ongoing IETF process to develop authenti...
John C. Mitchell, Arnab Roy, Paul Rowe, Andre Sced...
DLOG
2008
15 years 6 months ago
Partial and Informative Common Subsumers of Concepts Collections in Description Logics
Least Common Subsumers in Description Logics have shown their usefulness for discovering commonalities among all concepts of a collection. Several applications are nevertheless foc...
Simona Colucci, Eugenio Di Sciascio, Francesco M. ...
123
Voted
HOTDEP
2008
157views Hardware» more  HOTDEP 2008»
15 years 6 months ago
Byzantium: Byzantine-Fault-Tolerant Database Replication Providing Snapshot Isolation
Database systems are a key component behind many of today's computer systems. As a consequence, it is crucial that database systems provide correct and continuous service des...
Nuno M. Preguiça, Rodrigo Rodrigues, Crist&...
106
Voted
NSDI
2008
15 years 6 months ago
Characterizing Botnets from Email Spam Records
We develop new techniques to map botnet membership using traces of spam email. To group bots into botnets we look for multiple bots participating in the same spam email campaign. ...
Li Zhuang, John Dunagan, Daniel R. Simon, Helen J....
WSC
2008
15 years 6 months ago
A simulation based approach for supporting Automated Guided Vehicles (AGVs) systems design
Automated Guided Vehicle (AGV) logistic handling system are widely adopted when high transportation capacity and quality of service are the most important characteristics to reach...
Elisa Gebennini, Sara Dallari, Andrea Grassi, Gius...