Sciweavers

186 search results - page 19 / 38
» Efficient Security for Large and Dynamic Multicast Groups
Sort
View
87
Voted
JALC
2006
87views more  JALC 2006»
14 years 9 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
CSREAEEE
2006
110views Business» more  CSREAEEE 2006»
14 years 11 months ago
Network-in Quality the E-Business
Recent advances in user access technology enables the delivery of Network multicast to residential users. In order for such a service to be successful, efficient management must b...
Kaiquan Chen
94
Voted
MICRO
2010
IEEE
149views Hardware» more  MICRO 2010»
14 years 7 months ago
Improving SIMT Efficiency of Global Rendering Algorithms with Architectural Support for Dynamic Micro-Kernels
Wide Single Instruction, Multiple Thread (SIMT) architectures often require a static allocation of thread groups that are executed in lockstep throughout the entire application ker...
Michael Steffen, Joseph Zambreno
CASES
2010
ACM
14 years 7 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
ICNP
2000
IEEE
15 years 1 months ago
Optimal Partitioning of Multicast Receivers
Multicast sessions may have a large number of receivers with heterogeneous reception capacities. To accommodate this heterogeneity, various multi-rate schemes, based upon the use ...
Yang Richard Yang, Min Sik Kim, Simon S. Lam