Sciweavers

4270 search results - page 132 / 854
» A Permutation Approach to Validation
Sort
View
INFOCOM
2011
IEEE
14 years 8 months ago
Forwarding anomalies in Bloom filter-based multicast
Abstract—Several recently proposed multicast protocols use inpacket Bloom filters to encode multicast trees. These mechanisms are in principle highly scalable because no per-fl...
Mikko Särelä, Christian Esteve Rothenber...
CHES
2011
Springer
298views Cryptology» more  CHES 2011»
14 years 4 months ago
spongent: A Lightweight Hash Function
This paper proposes spongent – a family of lightweight hash functions with hash sizes of 88 (for preimage resistance only), 128, 160, 224, and 256 bits based on a sponge construc...
Andrey Bogdanov, Miroslav Knezevic, Gregor Leander...
COMSWARE
2006
IEEE
15 years 10 months ago
Case study on the use of SDL for specifying an IETF micro mobility protocol
—Recent protocols are become increasingly complex, and lead to further level of complexity when used in combination, often resulting in ambiguous behavior. This paper, starting f...
Telemaco Melia, Amardeo Sarma, Rui L. Aguiar, Diet...
PATAT
1997
Springer
107views Education» more  PATAT 1997»
15 years 8 months ago
A Comparison of Annealing Techniques for Academic Course Scheduling
In this study we have tackled the NP-hard problem of academic class scheduling (or timetabling) at the university level. We have investigated a variety of approaches based on simu...
M. A. Saleh Elmohamed, Paul D. Coddington, Geoffre...
HICSS
1998
IEEE
135views Biometrics» more  HICSS 1998»
15 years 8 months ago
The Architecture of Secure Systems
Secure system design, veri cation and validation is often a daunting task, involving the merger of various protection mechanisms in conjunction with system security policy and con...
Jim Alves-Foss