Sciweavers

947 search results - page 106 / 190
» Analysis of Techniques to Improve Protocol Processing Latenc...
Sort
View
CSFW
2002
IEEE
15 years 6 months ago
Capturing Parallel Attacks within the Data Independence Framework
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Philippa J. Broadfoot, A. W. Roscoe
IEEEARES
2009
IEEE
15 years 8 months ago
Capturing Information Flow with Concatenated Dynamic Taint Analysis
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint propagation across memory locations during program execution. Most implementat...
Hyung Chan Kim, Angelos D. Keromytis, Michael Covi...
CCS
2001
ACM
15 years 6 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
ICIP
2004
IEEE
16 years 3 months ago
Palette reordering under an exponential power distribution model of prediction residuals
Palette reordering is one of the most effective approaches for improving the compression of color-indexed images. Recently, a theoretically motivated modification of a reordering ...
António J. R. Neves, Armando J. Pinho
IR
2008
15 years 1 months ago
An analysis on document length retrieval trends in language modeling smoothing
Abstract. Document length is widely recognized as an important factor for adjusting retrieval systems. Many models tend to favor the retrieval of either short or long documents and...
David E. Losada, Leif Azzopardi