Sciweavers

3006 search results - page 312 / 602
» Overview
Sort
View
111
Voted
CN
2008
87views more  CN 2008»
15 years 4 months ago
Dynamic IP configuration of terminals in broadcasting networks
The concept of synergy between broadcasting and telecommunication networks has been strengthened by the emergence of multi-modal terminals, which are used in a broadcast environme...
Georgios Gardikis, S. Orfanos, George Kormentzas, ...
CORR
2010
Springer
157views Education» more  CORR 2010»
15 years 4 months ago
A Survey on Network Codes for Distributed Storage
Distributed storage systems often introduce redundancy to increase reliability. When coding is used, the repair problem arises: if a node storing encoded information fails, in orde...
Alexandros G. Dimakis, Kannan Ramchandran, Yunnan ...
COMPUTER
2008
86views more  COMPUTER 2008»
15 years 4 months ago
SSL/TLS Session-Aware User Authentication
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, such as Internet banking. SSL/TLS session-aware user authentication can be used to ...
Rolf Oppliger, Ralf Hauser, David A. Basin
101
Voted
CONCURRENCY
2008
79views more  CONCURRENCY 2008»
15 years 4 months ago
Job submission to grid computing environments
The problem of enabling scientist users to submit jobs to grid computing environments will eventually limit the usability of grids. The eMinerals project has tackled this problem ...
Richard P. Bruin, Toby O. H. White, Andrew M. Walk...
122
Voted
CORR
2010
Springer
135views Education» more  CORR 2010»
15 years 4 months ago
JIT Spraying and Mitigations
With the discovery of new exploit techniques, novel protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Random...
Piotr Bania