Sciweavers

44 search results - page 9 / 9
» Using equivalence-checking to verify robustness to denial of...
Sort
View
ICIP
2009
IEEE
14 years 6 months ago
Scaling Peer-to-peer Video-on-demand Systems Using Helpers
The throughput of Peer-to-Peer (P2P) Video-on-Demand (VoD) systems is typically capped by the users' aggregate upload bandwidth [1]. The drastic increase in the popularity of...
RTAS
2009
IEEE
14 years 5 days ago
The System-Level Simplex Architecture for Improved Real-Time Embedded System Safety
Embedded systems in safety-critical environments demand safety guarantees while providing many useful services that are too complex to formally verify or fully test. Existing appl...
Stanley Bak, Deepti K. Chivukula, Olugbemiga Adeku...
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
13 years 9 months ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
13 years 11 months ago
Peeking Through the Cloud: DNS-Based Estimation and Its Applications
Reliable network demographics are quickly becoming a much sought-after digital commodity. However, as the need for more refined Internet demographics has grown, so too has the ten...
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, ...