Sciweavers

12597 search results - page 2305 / 2520
» Complexity of Mechanism Design
Sort
View
152
Voted
EATIS
2007
ACM
15 years 8 months ago
Exhaustif: a fault injection tool for distributed heterogeneous embedded systems
This paper presents a new fault injection tool called Exhaustif (Exhaustive Workbench for Systems Reliability). Exhaustif is a SWIFI fault injection tool for fault tolerance verif...
Antonio Dasilva, José-Fernán Mart&ia...
SOUPS
2010
ACM
15 years 8 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
GLOBECOM
2007
IEEE
15 years 8 months ago
Joint Traffic Blocking and Routing Under Network Failures and Maintenances
Under device failures and maintenance activities, network resources reduce and congestion may arise inside networks. As a result, users experience degraded performance on packet d...
Chao Liang, Zihui Ge, Yong Liu
EUROSYS
2009
ACM
15 years 8 months ago
Effective and efficient compromise recovery for weakly consistent replication
Weakly consistent replication of data has become increasingly important both for loosely-coupled collections of personal devices and for large-scale infrastructure services. Unfor...
Prince Mahajan, Ramakrishna Kotla, Catherine C. Ma...
ACNS
2004
Springer
85views Cryptology» more  ACNS 2004»
15 years 8 months ago
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
One of the few quantitative metrics used to evaluate the security of a cryptographic file system is the key length of the encryption algorithm; larger key lengths correspond to hig...
Michael E. Locasto, Angelos D. Keromytis
« Prev « First page 2305 / 2520 Last » Next »