Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through exp...
Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Ha...
BLASTn is a tool universally used by biologists to identify similarities between nucleotide based biological genome sequences. This report describes an FPGA based hardware impleme...
—The performance of prevalent MAC protocols in MANETs relies on the level of contention in networks. While contention-based MAC protocols such as CSMA suffer from inefficiency u...
—The implementation and optimization of collective communication operations is an important field of active research. Such operations directly influence application performance...
Torsten Hoefler, Christian Siebert, Andrew Lumsdai...
We propose approximation algorithms under game-theoretic considerations. We indroduce and study the general covering problem which is a natural generalization of the well-studied m...