Sciweavers

17920 search results - page 3513 / 3584
» Recentering computer science
Sort
View
136
Voted
CCS
2008
ACM
15 years 2 months ago
Towards provable secure neighbor discovery in wireless networks
In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devices are within direct radio communication is an enabler for networking protocol...
Marcin Poturalski, Panagiotis Papadimitratos, Jean...
CCS
2008
ACM
15 years 2 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
ISCA
2010
IEEE
214views Hardware» more  ISCA 2010»
15 years 2 months ago
Translation caching: skip, don't walk (the page table)
This paper explores the design space of MMU caches that accelerate virtual-to-physical address translation in processor architectures, such as x86-64, that use a radix tree page t...
Thomas W. Barr, Alan L. Cox, Scott Rixner
92
Voted
CEAS
2008
Springer
15 years 2 months ago
Tracking Email Reputation for Authenticated Sender Identities
With the amount of unsolicited emails on the rise, domain authentication schemes have been widely deployed to identify senders. Establishing a sender's identity does not guar...
Gautam Singaraju, Jeffrey Moss, Brent ByungHoon Ka...
113
Voted
CODES
2006
IEEE
15 years 2 months ago
Architectural support for safe software execution on embedded processors
The lack of memory safety in many popular programming languages, including C and C++, has been a cause for great concern in the realm of software reliability, verification, and mo...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
« Prev « First page 3513 / 3584 Last » Next »