Sciweavers

4305 search results - page 658 / 861
» Analysing Protocol Implementations
Sort
View
MICRO
2008
IEEE
137views Hardware» more  MICRO 2008»
15 years 4 months ago
Verification of chip multiprocessor memory systems using a relaxed scoreboard
Verification of chip multiprocessor memory systems remains challenging. While formal methods have been used to validate protocols, simulation is still the dominant method used to ...
Ofer Shacham, Megan Wachs, Alex Solomatnikov, Amin...
JSS
2007
121views more  JSS 2007»
15 years 4 months ago
SEAL: A secure communication library for building dynamic group key agreement applications
We present the SEcure communicAtion Library (SEAL), a Linux-based C language application programming interface (API) library that implements secure group key agreement algorithms ...
Patrick P. C. Lee, John C. S. Lui, David K. Y. Yau
SAC
2008
ACM
15 years 3 months ago
Offline count-limited certificates
In this paper, we present the idea of offline count-limited certificates (or clics for short), and show how these can be implemented using minimal trusted hardware functionality a...
Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rho...
FAST
2009
15 years 2 months ago
HYDRAstor: A Scalable Secondary Storage
HYDRAstor is a scalable, secondary storage solution aimed at the enterprise market. The system consists of a back-end architectured as a grid of storage nodes built around a distr...
Cezary Dubnicki, Leszek Gryz, Lukasz Heldt, Michal...
ICNS
2009
IEEE
15 years 2 months ago
A BitTorrent Performance Evaluation Framework
In the last decade, file sharing systems have generally been dominated by P2P solutions. Whereas e-mail and HTTP have been the killer apps of the earlier Internet, a large percent...
Razvan Deaconescu, Razvan Rughinis, Nicolae Tapus