Sciweavers

1494 search results - page 90 / 299
» Less Extreme Programming
Sort
View
AFRICACRYPT
2010
Springer
15 years 9 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
139
Voted
ICMCS
2008
IEEE
131views Multimedia» more  ICMCS 2008»
15 years 9 months ago
Wyner-Ziv coding with spatio-temporal refinement based on successive turbo decoding
Arising needs for extremely simple encoder motivate investigations on distributed video coding (DVC). The Wyner-Ziv coding, one of the representative DVC schemes, reconstructs vid...
Bonghyuck Ko, Hiuk Jae Shim, Byeungwoo Jeon
118
Voted
INFOCOM
2007
IEEE
15 years 8 months ago
Tree, Segment Table, and Route Bucket: A Multi-Stage Algorithm for IPv6 Routing Table Lookup
—Next generation internet protocol, IPv6, has attracted growing attention and has been deploying worldwide. With 128-bit address, IPv6 provides an extremely large address space a...
Zhenqiang Li, Dongqu Zheng, Yan Ma
104
Voted
NCA
2007
IEEE
15 years 8 months ago
Using Virtualization to Improve Software Rejuvenation
In this paper, we present an approach for software rejuvenation based on automated self-healing techniques that can be easily applied to off-the-shelf Application Servers and Inte...
Luís Moura Silva, Javier Alonso, Paulo Silv...
IWIA
2006
IEEE
15 years 8 months ago
The LAIDS/LIDS Framework for Systematic IPS Design
The recent outbreaks of extremely fast spreading worms highlight the inadequacy of the current patching approach. Intrusion prevention systems (IPSs) that automatically generate a...
Simon P. Chung, Aloysius K. Mok