Sciweavers

1362 search results - page 115 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
129
Voted
WSC
1997
15 years 5 months ago
On the Effect and Control of Self-Similar Network Traffic: A Simulation Perspective
This paper presents a discussion of simulation-related issues arising in the study of self-similar network traffic with respect to its effect and control. Selfsimilar traffic has...
Kihong Park
118
Voted
CGF
1998
101views more  CGF 1998»
15 years 3 months ago
Rapid and Accurate Contact Determination between Spline Models using ShellTrees
In this paper, we present an e cient algorithm for contact determination between spline models. We make use of a new hierarchy, called ShellTree, that comprises of spherical shell...
Shankar Krishnan, M. Gopi, Ming C. Lin, Dinesh Man...
148
Voted
EUROCRYPT
2008
Springer
15 years 5 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
118
Voted
ENTCS
2007
95views more  ENTCS 2007»
15 years 3 months ago
Rijndael for Sensor Networks: Is Speed the Main Issue?
We present an implementation of Rijndael for wireless sensor networks running on Eyes sensor nodes. In previous works, Rijndael has not been considered a suitable encryption algor...
Andrea Vitaletti, Gianni Palombizio
141
Voted
CORR
2010
Springer
150views Education» more  CORR 2010»
15 years 3 months ago
Boosting Multi-Core Reachability Performance with Shared Hash Tables
Abstract--This paper focuses on data structures for multicore reachability, which is a key component in model checking algorithms and other verification methods. A cornerstone of a...
Alfons Laarman, Jaco van de Pol, Michael Weber 000...