Sciweavers

6404 search results - page 1015 / 1281
» Blocks
Sort
View
COLCOM
2008
IEEE
15 years 6 months ago
Mashup Model and Verification Using Mashup Processing Network
Abstract. Mashups are defined to be lightweight Web applications aggregating data from different Web services, built using ad-hoc composition and being not concerned with long term...
Ehtesham Zahoor, Olivier Perrin, Claude Godart
CONEXT
2008
ACM
15 years 6 months ago
High-throughput, reliable multicast without "crying babies" in wireless mesh networks
There are two primary challenges to supportinghigh-throughput, reliable multicast in wireless mesh networks (WMNs). The first is no different from unicast: wireless links are inhe...
Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun ...
CONEXT
2008
ACM
15 years 6 months ago
High performance traffic shaping for DDoS mitigation
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we ...
Markus Goldstein, Matthias Reif, Armin Stahl, Thom...
CPM
2008
Springer
112views Combinatorics» more  CPM 2008»
15 years 6 months ago
Computing Inverse ST in Linear Complexity
The Sort Transform (ST) can significantly speed up the block sorting phase of the Burrows-Wheeler transform (BWT) by sorting only limited order contexts. However, the best result o...
Ge Nong, Sen Zhang, Wai Hong Chan
CRYPTO
2008
Springer
163views Cryptology» more  CRYPTO 2008»
15 years 6 months ago
Cryptanalysis of the GOST Hash Function
In this article, we analyze the security of the GOST hash function. The GOST hash function, defined in the Russian standard GOST 34.11-94, is an iterated hash function producing a ...
Florian Mendel, Norbert Pramstaller, Christian Rec...
« Prev « First page 1015 / 1281 Last » Next »