Sciweavers

134 search results - page 19 / 27
» A Hybrid Approach for Accurate Application Traffic Identific...
Sort
View
CODES
2004
IEEE
15 years 1 months ago
Multi-objective mapping for mesh-based NoC architectures
In this paper we present an approach to multi-objective exploration of the mapping space of a mesh-based network-on-chip architecture. Based on evolutionary computing techniques, ...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi
FORTE
2004
14 years 11 months ago
Localizing Program Errors for Cimple Debugging
Abstract. We present automated techniques for the explanation of counterexamples, where a counter-example should be understood as a sequence of program statements. Our approach is ...
Samik Basu, Diptikalyan Saha, Scott A. Smolka
FC
1997
Springer
107views Cryptology» more  FC 1997»
15 years 1 months ago
An Efficient Micropayment System Based on Probabilistic Polling
Existing software proposals for electronic payments can be divided into "on-line" schemes that require participation of a trusted party (the bank) in every transaction an...
Stanislaw Jarecki, Andrew M. Odlyzko
SENSYS
2006
ACM
15 years 3 months ago
Funneling-MAC: a localized, sink-oriented MAC for boosting fidelity in sensor networks
Sensor networks exhibit a unique funneling effect which is a product of the distinctive many-to-one, hop-by-hop traffic pattern found in sensor networks, and results in a signific...
Gahng-Seop Ahn, Se Gi Hong, Emiliano Miluzzo, Andr...
ACSAC
2002
IEEE
15 years 2 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti