Sciweavers

1369 search results - page 57 / 274
» A Practical Implementation of the Timing Attack
Sort
View
102
Voted
ESA
2007
Springer
122views Algorithms» more  ESA 2007»
15 years 4 months ago
A Practical Efficient Fptas for the 0-1 Multi-objective Knapsack Problem
Abstract. In the present work, we are interested in the practical behavior of a new fptas to solve the approximation version of the 0-1 multiobjective knapsack problem. Nevertheles...
Cristina Bazgan, Hadrien Hugot, Daniel Vanderpoote...
96
Voted
KIVS
2009
Springer
15 years 7 months ago
Practical Rate-Based Congestion Control for Wireless Mesh Networks
We introduce an adaptive pacing scheme to overcome the drawbacks of TCP in wireless mesh networks with Internet connectivity. The pacing scheme is implemented at the wireless TCP s...
Sherif M. ElRakabawy, Christoph Lindemann
113
Voted
ICNP
2006
IEEE
15 years 6 months ago
Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL
— This paper reports on an experiment in network protocol design: we use novel rigorous techniques in the design process of a new protocol, in a close collaboration between syste...
Adam Biltcliffe, Michael Dales, Sam Jansen, Tom Ri...
105
Voted
EDO
2005
Springer
15 years 6 months ago
Using parse tree validation to prevent SQL injection attacks
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input, such as form fields, and then include this input ...
Gregory Buehrer, Bruce W. Weide, Paolo A. G. Sivil...
ISLPED
2000
ACM
99views Hardware» more  ISLPED 2000»
15 years 5 months ago
Practical considerations of clock-powered logic
Recovering and reusing circuit energies that would otherwise be dissipated as heat can reduce the power dissipated by a VLSI chip. To accomplish this requires a power source that ...
William C. Athas