Sciweavers

2081 search results - page 24 / 417
» Chaotic Systems Synchronization in Secure Communication Syst...
Sort
View
85
Voted
DAC
2008
ACM
15 years 10 months ago
Latency and bandwidth efficient communication through system customization for embedded multiprocessors
We present a cross-layer customization methodology for latency and bandwidth efficient inter-core communication in embedded multiprocessors. The methodology integrates compiler, o...
Chenjie Yu, Peter Petrov
88
Voted
MDM
2010
Springer
153views Communications» more  MDM 2010»
15 years 2 months ago
Dessy: Search and Synchronization on the Move
—Current smartphones have a storage capacity of several gigabytes. More and more information is stored on mobile devices. To meet the challenge of information organization, we tu...
Eemil Lagerspetz, Sasu Tarkoma, Tancred Lindholm
72
Voted
COLCOM
2005
IEEE
15 years 3 months ago
Providing both scale and security through a single core probabilistic protocol
Distributed systems are typically designed for scale and performance first, which makes it difficult to add security later without affecting the original properties. This paper ...
Ramsés Morales, Indranil Gupta
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 1 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
COMPLEXITY
2007
151views more  COMPLEXITY 2007»
14 years 9 months ago
From complex conflicts to stable cooperation: Cases in environment and security
: Conflict is a dynamic and complex form of human interaction, often emerging from incompatible actions, values and goals, and consuming a considerable amount of resources. Conflic...
Jürgen Scheffran, Bruce Hannon