Sciweavers

384 search results - page 66 / 77
» Get another label
Sort
View
103
Voted
RTAS
2005
IEEE
15 years 6 months ago
Timing Analysis of TCP Servers for Surviving Denial-of-Service Attacks
— Denial-of-service attacks are becoming more frequent and sophisticated. Researchers have proposed a variety of defenses, including better system configurations, infrastructure...
V. Krishna Nandivada, Jens Palsberg
117
Voted
TPHOL
2005
IEEE
15 years 6 months ago
A HOL Theory of Euclidean Space
We describe a formalization of the elementary algebra, topology and analysis of finite-dimensional Euclidean space in the HOL Light theorem prover. (Euclidean space is RN with the...
John Harrison
93
Voted
ICADL
2004
Springer
115views Education» more  ICADL 2004»
15 years 6 months ago
PaSE: Locating Online Copy of Scientific Documents Effectively
The need for fast and vast dissemination of research results has led a new trend such that more number of authors post their documents to personal or group Web spaces so that other...
Byung-Won On, Dongwon Lee
133
Voted
ISPASS
2003
IEEE
15 years 6 months ago
Accelerating private-key cryptography via multithreading on symmetric multiprocessors
Achieving high performance in cryptographic processing is important due to the increasing connectivity among today’s computers. Despite steady improvements in microprocessor and...
Praveen Dongara, T. N. Vijaykumar
AOSD
2003
ACM
15 years 6 months ago
Quantifying aspects in middleware platforms
Middleware technologies such as Web Services, CORBA and DCOM have been very successful in solving distributed computing problems for a large family of application domains. As midd...
Charles Zhang, Hans-Arno Jacobsen