Sciweavers

15782 search results - page 2891 / 3157
» Network Optimization and Control
Sort
View
IFIP
1994
Springer
15 years 8 months ago
E-mail as an Enabling Technology in Brazil: The CNPq/ProTeM-CC Experience
Development of a research project in Computer Science, integrating a considerable number of research institutions and about 1200 individual researchers all over a country with big...
José Palazzo M. de Oliveira, Norberto Hoppe...
COMPSAC
2009
IEEE
15 years 8 months ago
Tamper Resistance for Software Defined Radio Software
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
Shucai Xiao, Jung-Min Park, Yanzhu Ye
CSE
2009
IEEE
15 years 8 months ago
A Distributed Reservation Protocol for Collision-Free Three-Hop Mobility Support in WiMedia MAC
A Distributed Medium Access Control (D-MAC) protocol has been proposed to support high-rate Wireless Personal Area Networks (HR-WPANs) by the WiMedia Alliance. The WiMedia D-MAC s...
Jin-Woo Kim, Kyeong Hur, Kwang-il Hwang, Doo Seop ...
CSFW
2009
IEEE
15 years 8 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
GLOBECOM
2009
IEEE
15 years 8 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
« Prev « First page 2891 / 3157 Last » Next »