Sciweavers

9503 search results - page 33 / 1901
» Authenticated System Calls
Sort
View
PIMRC
2008
IEEE
15 years 10 months ago
AuthScan: Enabling fast handoff across already deployed IEEE 802.11 wireless networks
Abstract—Handoff procedure in IEEE 802.11 wireless networks must be accomplished with as little interruption as possible to maintain the required quality of service (QoS). We hav...
Jaeouk Ok, Pedro Morales, Hiroyuki Morikawa
QUANTUMCOMM
2009
Springer
15 years 11 months ago
The Case for Quantum Key Distribution
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructur...
Douglas Stebila, Michele Mosca, Norbert Lütke...
EUROSYS
2009
ACM
16 years 1 months ago
xCalls: safe I/O in memory transactions
Memory transactions, similar to database transactions, allow a programmer to focus on the logic of their program and let the system ensure that transactions are atomic and isolate...
Haris Volos, Andres Jaan Tack, Neelam Goyal, Micha...
CASES
2004
ACM
15 years 8 months ago
Providing time- and space- efficient procedure calls for asynchronous software thread integration
Asynchronous Software Thread Integration (ASTI) provides fine-grain concurrency in real-time threads by statically scheduling (integrating) code from primary threads into secondar...
Vasanth Asokan, Alexander G. Dean
ISCC
2006
IEEE
109views Communications» more  ISCC 2006»
15 years 10 months ago
A Call Level Adaptive Bandwidth Allocation Scheme Based on Lyapunov Control Theory
— In this paper, we propose an adaptive capacity allocation scheme at the call level for a blocked call cleared loss system. The scheme aims to maintain the connection blocking p...
Hesham Bin-Abbas, David Tipper