Sciweavers

828 search results - page 83 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
WAC
2004
Springer
15 years 8 months ago
A Metabolic Approach to Protocol Resilience
The goal of this research is to create robust execution circuits for communication software which can distribute over a network and which continues to provide its service despite p...
Christian F. Tschudin, Lidia Yamamoto
NDSS
2005
IEEE
15 years 8 months ago
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables users to “try out” new software (or configuration changes to existing soft...
Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan,...
STORAGESS
2005
ACM
15 years 8 months ago
Secure capabilities for a petabyte-scale object-based distributed file system
Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed...
Christopher Olson, Ethan L. Miller
IPPS
2007
IEEE
15 years 9 months ago
Coordinating Data Parallel SAC Programs with S-Net
We propose a two-layered approach for exploiting different forms of concurrency in complex systems: We specify computational components in our functional array language SaC, whic...
Clemens Grelck, Sven-Bodo Scholz, Alexander V. Sha...
MATA
2004
Springer
199views Communications» more  MATA 2004»
15 years 8 months ago
Configuration Management for Networked Reconfigurable Embedded Devices
Distribution of product updates to embedded devices can increase product lifetimes for consumers and boost revenues for vendors. Dynamic provisioning of application solutions to e...
Timothy O'Sullivan, Richard Studdert