Sciweavers

1845 search results - page 186 / 369
» Computing the Angularity Tolerance
Sort
View
ICN
2001
Springer
15 years 8 months ago
An Evaluation of Shared Multicast Trees with Multiple Active Cores
Abstract. Core-based multicast trees use less router state, but have significant drawbacks when compared to shortest-path trees, namely higher delay and poor fault tolerance. We e...
Daniel Zappala, Aaron Fabbri
DSN
2000
IEEE
15 years 8 months ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur
125
Voted
ICDCS
2000
IEEE
15 years 8 months ago
On Low-Cost Error Containment and Recovery Methods for Guarded Software Upgrading
To assure dependable onboard evolution, we have developed a methodology called guarded software upgrading (GSU). In this paper, we focus on a low-cost approach to error containmen...
Ann T. Tai, Kam S. Tso, Leon Alkalai, Savio N. Cha...
122
Voted
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
15 years 7 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
133
Voted
WCNC
2010
IEEE
15 years 7 months ago
Socially-Aware Publish/Subscribe System for Human Networks
Abstract—The development of modern communication technologies fosters human networks (HUNETs)—an information dissemination platform comprised of human-carried wirelessenabled d...
Yaxiong Zhao, Jie Wu