Sciweavers

3902 search results - page 665 / 781
» Hardware Synthesis from C C Models
Sort
View
97
Voted
ASIAN
2006
Springer
116views Algorithms» more  ASIAN 2006»
15 years 4 months ago
Secrecy Analysis in Protocol Composition Logic
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
97
Voted
CCS
2006
ACM
15 years 4 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
101
Voted
ESTIMEDIA
2006
Springer
15 years 4 months ago
Resource Manager for Non-preemptive Heterogeneous Multiprocessor System-on-chip
Increasingly more MPSoC platforms are being developed to meet the rising demands from concurrently executing applications. These systems are often heterogeneous with the use of de...
Akash Kumar, Bart Mesman, Bart D. Theelen, Henk Co...
INFOCOM
2000
IEEE
15 years 4 months ago
A Modular Approach to Packet Classification: Algorithms and Results
The ability to classify packets according to pre-defined rules is critical to providing many sophisticated value-added services, such as security, QoS, load balancing, traffic acco...
Thomas Y. C. Woo
QOFIS
2000
Springer
15 years 4 months ago
The Direct Adjustment Algorithm: A TCP-Friendly Adaptation Scheme
Many distributed multimedia applications have the ability to adapt to uctuations in the network conditions. By adjusting temporal and spatial quality to available bandwidth, or man...
Dorgham Sisalem, Henning Schulzrinne