Sciweavers

110 search results - page 22 / 22
» A Compositional Framework for Real-Time Guarantees
Sort
View
CN
2004
84views more  CN 2004»
13 years 5 months ago
A parameter based admission control for differentiated services networks
The Differentiated Services architecture targets at providing scalable network Quality of Service by means of aggregate scheduling. However, the defined framework itself only give...
Markus Fidler, Volker Sander
SIGCOMM
2003
ACM
13 years 10 months ago
Network routing with path vector protocols: theory and applications
Path vector protocols are currently in the limelight, mainly because the inter-domain routing protocol of the Internet, BGP (Border Gateway Protocol), belongs to this class. In th...
João L. Sobrinho
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
12 years 5 months ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
13 years 10 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
SRDS
1999
IEEE
13 years 9 months ago
Formal Hazard Analysis of Hybrid Systems in cTLA
Hybrid systems like computer-controlled chemical plants are typical safety critical distributed systems. In present practice, the safety of hybrid systems is guaranteed by hazard ...
Peter Herrmann, Heiko Krumm