Sciweavers

7329 search results - page 1437 / 1466
» Network Extractor Protocols
Sort
View
73
Voted
ICISC
2008
103views Cryptology» more  ICISC 2008»
14 years 11 months ago
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Secure Evaluation of Private Functions (PF-SFE) allows two parties to compute a private function which is known by one party only on private data of both. It is known that PF-SFE c...
Ahmad-Reza Sadeghi, Thomas Schneider 0003
OPODIS
2008
14 years 11 months ago
Solving Atomic Multicast When Groups Crash
In this paper, we study the atomic multicast problem, a fundamental abstraction for building faulttolerant systems. In the atomic multicast problem, the system is divided into non...
Nicolas Schiper, Fernando Pedone
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
14 years 11 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...
82
Voted
IC
2004
14 years 11 months ago
An Efficient TCP Buffer Tuning Technique Based on Packet Loss Ratio (TBT-PLR)
The existing TCP (Transmission Control Protocol) is known to be unsuitable for a network with the characteristics of high BDP (Bandwidth-Delay Product) because of the fixed small o...
Gi-chul Yoo, Eun-sook Sim, Dongkyun Kim, Taeyoung ...
FORTE
2003
14 years 11 months ago
Correct Passive Testing Algorithms and Complete Fault Coverage
The aim of passive testing is to detect faults in a system while observing the system during normal operation, that is, without forcing the system to specialized inputs explicitly ...
Arun N. Netravali, Krishan K. Sabnani, Ramesh Visw...
« Prev « First page 1437 / 1466 Last » Next »