Sciweavers

964 search results - page 70 / 193
» On Securely Scheduling a Meeting
Sort
View
ISCA
2012
IEEE
234views Hardware» more  ISCA 2012»
13 years 2 months ago
PARDIS: A programmable memory controller for the DDRx interfacing standards
Modern memory controllers employ sophisticated address mapping, command scheduling, and power management optimizations to alleviate the adverse effects of DRAM timing and resource...
Mahdi Nazm Bojnordi, Engin Ipek
NDSS
2008
IEEE
15 years 6 months ago
Exploiting Opportunistic Scheduling in Cellular Data Networks
Third Generation (3G) cellular networks utilize timevarying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to effic...
Radmilo Racic, Denys Ma, Hao Chen, Xin Liu
CCS
2009
ACM
15 years 6 months ago
Multi-party off-the-record messaging
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...
IJNSEC
2008
132views more  IJNSEC 2008»
14 years 12 months ago
An Authenticated Key Agreement Protocol Using Conjugacy Problem in Braid Groups
In this paper we propose an authenticated key agreement, which works in a braid group. We prove that our protocol meet the security attributes under the assumption that the Conjug...
Atul Chaturvedi, Sunder Lal
EH
2002
IEEE
104views Hardware» more  EH 2002»
15 years 4 months ago
Evolvable Hardware for the Generation of Sequential Filter Circuits
Evolutionary algorithms (EAs) are regularly used both for the solution of scheduling problems, and for the creation of digital circuit designs. This paper describes a unified app...
Robert Thomson, Tughrul Arslan