Sciweavers

112
Voted
DSN
2004
IEEE
15 years 7 months ago
Cyclic Redundancy Code (CRC) Polynomial Selection For Embedded Networks
Cyclic Redundancy Codes (CRCs) provide a first line of defense against data corruption in many networks. Unfortunately, many commonly used CRC polynomials provide significantly le...
Philip Koopman, Tridib Chakravarty
145
Voted
CDVE
2006
Springer
109views Visualization» more  CDVE 2006»
15 years 7 months ago
Use of Patterns for Knowledge Management in the Ceramic Tile Design Chain
Knowledge Management (KM) is a complex objective, especially in the instance of extended enterprises consisting of SMEs, and critical in new product design and development (NPD). T...
María Jesús Agost, Fernando Romero, ...
89
Voted
DSN
2004
IEEE
15 years 7 months ago
Support for Mobility and Fault Tolerance in Mykil
This paper describes the support provided for mobility and fault tolerance in Mykil, which is a key distribution protocol for large, secure group multicast. Mykil is based on a com...
Jyh-How Huang, Shivakant Mishra
DSN
2004
IEEE
15 years 7 months ago
The Recursive NanoBox Processor Grid: A Reliable System Architecture for Unreliable Nanotechnology Devices
Advanced molecular nanotechnology devices are expected to have exceedingly high transient fault rates and large numbers of inherent device defects compared to conventional CMOS de...
A. J. KleinOsowski, Kevin KleinOsowski, Vijay Rang...
89
Voted
DSN
2004
IEEE
15 years 7 months ago
A Defense-Centric Taxonomy Based on Attack Manifestations
Many classifications of attacks have been tendered, often in taxonomic form. A common basis of these taxonomies is that they have been framed from the perspective of an attacker
Kevin S. Killourhy, Roy A. Maxion, Kymie M. C. Tan