Sciweavers

7329 search results - page 1359 / 1466
» Network Extractor Protocols
Sort
View
111
Voted
SIGCOMM
1999
ACM
15 years 8 months ago
Routing with a Clue
We suggest a new simple forwarding technique to speed-up IP destination address lookup. The technique is a natural extension of IP, requires 5 bits in the IP header (IPv4, 7 in IP...
Anat Bremler-Barr, Yehuda Afek, Sariel Har-Peled
119
Voted
APSEC
1998
IEEE
15 years 7 months ago
wwHww : An Application Framework of Distributed Systems for Enduser-Initiative Development
The number of endusers using the Internet increases on the inside and outside of offices. Enduser-initiative development of applications has become important for automation of the...
Takeshi Chusho, Katsuya Fujiwara
142
Voted
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 7 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
SIGCOMM
1998
ACM
15 years 7 months ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam
148
Voted
ISMVL
1997
IEEE
99views Hardware» more  ISMVL 1997»
15 years 7 months ago
Useful Application of CMOS Ternary Logic to the Realisation of Asynchronous Circuits
This paper shows how the application of a CMOS ternary logic is useful in the realisation of Delay Insensitive (01)asynchronous circuits. It is shown that fully DIasynchronous cir...
Riccardo Mariani, Roberto Roncella, Roberto Salett...
« Prev « First page 1359 / 1466 Last » Next »