Sciweavers

1123 search results - page 77 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
ICDCS
1997
IEEE
15 years 4 months ago
Secure Reliable Multicast Protocols in a WAN
A secure reliable multicast protocol enables a process to send a message to a group of recipients such that all correct destinations receive the same message, despite the maliciou...
Dahlia Malkhi, Michael Merritt, Ohad Rodeh
WWW
2003
ACM
16 years 16 days ago
A Multicast-On-Large-Demand Approach to the Flash Crowd Problem
In this paper we propose a multicast-on-large-demand (MOLD) approach to the flash crowd problem. A MOLD Web server may dynamically open a multicast channel for resources when dete...
Rocky K. C. Chang
FSTTCS
2003
Springer
15 years 5 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
ICW
2005
IEEE
167views Communications» more  ICW 2005»
15 years 5 months ago
Dynamic Software Reconfiguration in Sensor Networks
Reconfiguration and self-adaptation are vital capabilities of sensor networks and networked embedded systems that are required to operate in dynamic environments. This paper prese...
Sachin Kogekar, Sandeep Neema, Xenofon D. Koutsouk...
AGI
2011
14 years 3 months ago
What Makes a Brain Smart? Reservoir Computing as an Approach for General Intelligence
Abstract. Recurrent connectivity, balanced between excitation and inhibition, is a general principle of cortical connectivity. We propose that balanced recurrence can be achieved b...
Janelle Szary, Bryan Kerster, Christopher T. Kello