Sciweavers

400 search results - page 70 / 80
» RFID Security: Tradeoffs between Security and Efficiency
Sort
View
ANCS
2008
ACM
14 years 12 months ago
Low power architecture for high speed packet classification
Today's routers need to perform packet classification at wire speed in order to provide critical services such as traffic billing, priority routing and blocking unwanted Inte...
Alan Kennedy, Xiaojun Wang, Zhen Liu, Bin Liu
JNSM
2008
130views more  JNSM 2008»
14 years 9 months ago
Declarative Infrastructure Configuration Synthesis and Debugging
There is a large conceptual gap between end-to-end infrastructure requirements and detailed component configuration implementing those requirements. Today, this gap is manually br...
Sanjai Narain, Gary Levin, Sharad Malik, Vikram Ka...
GLOBECOM
2007
IEEE
15 years 4 months ago
Hierarchical Provisioning Algorithm for Virtual Private Networks Using the Hose Model
— Virtual Private Networks (VPN) provide a secure and reliable communication between customer sites over a shared network. Two models were proposed for the service provisioning i...
Monia Ghobadi, Sudhakar Ganti, Gholamali C. Shoja
ACNS
2006
Springer
138views Cryptology» more  ACNS 2006»
15 years 1 months ago
Syntax-Driven Private Evaluation of Quantified Membership Queries
Abstract. Membership queries are basic predicate operations that apply to datasets. Quantifications of such queries express global properties between datasets, including subset inc...
Aggelos Kiayias, Antonina Mitrofanova
ISI
2006
Springer
14 years 9 months ago
Tracing the Event Evolution of Terror Attacks from On-Line News
Since the September 11th terror attack at New York in 2001, the frequency of terror attacks around the world has been increasing and it draws more attention of the public. On Janua...
Christopher C. Yang, Xiaodong Shi, Chih-Ping Wei