Sciweavers

1612 search results - page 224 / 323
» About models of security protocols
Sort
View
ECBS
2011
IEEE
271views Hardware» more  ECBS 2011»
13 years 9 months ago
MoPED: A Model-Based Provisioning Engine for Dependability in Component-Based Distributed Real-Time Embedded Systems
—Developing dependable distributed real-time and embedded (DRE) systems incurs significant complexities in the tradeoffs resulting from the different conflicting attributes of ...
Sumant Tambe, Akshay Dabholkar, Aniruddha S. Gokha...
OOPSLA
2010
Springer
14 years 8 months ago
Encapsulation and locality: a foundation for concurrency support in multi-language virtual machines?
We propose to search for common abstractions for different concurrency models to enable high-level language virtual machines to support a wide range of different concurrency model...
Stefan Marr
ICNP
2005
IEEE
15 years 3 months ago
Trading Precision for Stability in Congestion Control with Probabilistic Packet Marking
In pricing-based congestion control protocols it is common to assume that the rate of congestion feedback from the network is limited to a single bit per packet. To obtain a preci...
Jonathan K. Shapiro, C. V. Hollot, Donald F. Towsl...
GLOBECOM
2009
IEEE
14 years 7 months ago
Measurements of Multicast Service Discovery in a Campus Wireless Network
Abstract--Applications using multicast service discovery protocols, such as iTunes, have become increasingly popular. However, multicast service discovery protocols generate signif...
Se Gi Hong, Suman Srinivasan, Henning Schulzrinne
ACSC
2008
IEEE
15 years 4 months ago
Privacy preserving set intersection based on bilinear groups
We propose a more efficient privacy preserving set intersection protocol which improves the previously known result by a factor of O(N) in both the computation and communication c...
Yingpeng Sang, Hong Shen