Sciweavers

7300 search results - page 1354 / 1460
» Multi-modal network protocols
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 9 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
SIGCOMM
1998
ACM
15 years 9 months ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam
ISMVL
1997
IEEE
99views Hardware» more  ISMVL 1997»
15 years 9 months ago
Useful Application of CMOS Ternary Logic to the Realisation of Asynchronous Circuits
This paper shows how the application of a CMOS ternary logic is useful in the realisation of Delay Insensitive (01)asynchronous circuits. It is shown that fully DIasynchronous cir...
Riccardo Mariani, Roberto Roncella, Roberto Salett...
159
Voted
ICCCN
2007
IEEE
15 years 8 months ago
Applying Wavelet De-noising to Improve TCP Throughput in AQM queues with Existence of Unresponsive Traffic
Abstract-- in the current Internet, congestion control is performed jointly by the end systems running the TCP protocol and by routers running Active Queue Management (AQM) algorit...
Yi Pan, Wei K. Tsai, Tatsuya Suda
CCS
2006
ACM
15 years 8 months ago
Providing witness anonymity in peer-to-peer systems
In this paper, we introduce the concept of witness anonymity for peer-to-peer systems. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest p...
Bo Zhu, Sanjeev Setia, Sushil Jajodia
« Prev « First page 1354 / 1460 Last » Next »