Sciweavers

7329 search results - page 1249 / 1466
» Network Extractor Protocols
Sort
View
LCN
1994
IEEE
15 years 8 months ago
The Packet Starvation Effect in CSMA/CD LANs and a Solution
In this paper we explore the packet starvation effect (PSE) that occurs in Ethernet controllers due to the unfairness of the CSMA/CD algorithm. The PSE causes some packets to expe...
Brian Whetten, Stephen Steinberg, Domenico Ferrari
PODC
1990
ACM
15 years 8 months ago
Sharing Memory Robustly in Message-Passing Systems
Emulators that translate algorithms from the shared-memory model to two different message-passing models are presented. Both are achieved by implementing a wait-free, atomic, singl...
Hagit Attiya, Amotz Bar-Noy, Danny Dolev
SP
1989
IEEE
101views Security Privacy» more  SP 1989»
15 years 8 months ago
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988
In early November 1988 the Internet, a collection of networks consisting of 60,000 host computers implementing the TCP/IP protocol suite, was attacked by a virus, a programwhich b...
Mark W. Eichin, Jon A. Rochlis
CCS
2009
ACM
15 years 8 months ago
On the difficulty of software-based attestation of embedded devices
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
Claude Castelluccia, Aurélien Francillon, D...
DSN
2009
IEEE
15 years 8 months ago
HC-BGP: A light-weight and flexible scheme for securing prefix ownership
The Border Gateway Protocol (BGP) is a fundamental building block of the Internet infrastructure. However, due to the implicit trust assumption among networks, Internet routing re...
Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. C...
« Prev « First page 1249 / 1466 Last » Next »