Sciweavers

7992 search results - page 1344 / 1599
» Communication Abstractions for Distributed Systems
Sort
View
INFOCOM
2006
IEEE
15 years 11 months ago
The Internet Dark Matter - on the Missing Links in the AS Connectivity Map
Abstract— The topological structure of the Internet infrastructure is an important and interesting subject that attracted significant research attention in the last few years. A...
Rami Cohen, Danny Raz
130
Voted
RANDOM
1998
Springer
15 years 9 months ago
Using Approximation Hardness to Achieve Dependable Computation
Abstract. Redundancy has been utilized to achieve fault tolerant computation and to achieve reliable communication in networks of processors. These techniques can only be extended ...
Mike Burmester, Yvo Desmedt, Yongge Wang
144
Voted
SP
2010
IEEE
217views Security Privacy» more  SP 2010»
15 years 8 months ago
Experimental Security Analysis of a Modern Automobile
Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular...
Karl Koscher, Alexei Czeskis, Franziska Roesner, S...
ICC
2007
IEEE
128views Communications» more  ICC 2007»
15 years 5 months ago
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection
Abstract— A clear deficiency in most of todays Anomaly Intrusion Detection Systems (AIDS) is their inability to distinguish between a new form of legitimate normal behavior and ...
Mohammad Al-Subaie, Mohammad Zulkernine
IJPP
2006
145views more  IJPP 2006»
15 years 4 months ago
Deterministic Parallel Processing
Abstract. In order to address the problems faced in the wireless communications domain, picoChip has devised the picoArrayTM . The picoArrayTM is a tiled-processor architecture, co...
Gajinder Panesar, Daniel Towner, Andrew Duller, Al...
« Prev « First page 1344 / 1599 Last » Next »