Sciweavers

1058 search results - page 193 / 212
» Secure Group Communications Using Key Graphs
Sort
View
ICC
2007
IEEE
106views Communications» more  ICC 2007»
15 years 4 months ago
A Distributed Approach to End-to-End Network Topology Inference
Abstract— To construct an efficient overlay network, the information of underlay is important. However, the inference of an underlay topology is not easy. We consider using end-...
Xing Jin, Qiuyan Xia, Shueng-Han Gary Chan
FTTCS
2006
132views more  FTTCS 2006»
14 years 9 months ago
Algorithms and Data Structures for External Memory
Data sets in large applications are often too massive to fit completely inside the computer's internal memory. The resulting input/output communication (or I/O) between fast ...
Jeffrey Scott Vitter
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
15 years 3 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
QUESTA
1998
93views more  QUESTA 1998»
14 years 9 months ago
An approximation method for complete solutions of Markov-modulated fluid models
This paper presents an approximation method for numerically solving general Markov modulated fluid models which are widely used in modelling communications and computer systems. ...
David D. McDonald, Kun Qian
PVLDB
2010
122views more  PVLDB 2010»
14 years 8 months ago
Database Replication: a Tale of Research across Communities
Replication is a key mechanism to achieve scalability and fault-tolerance in databases. Its importance has recently been further increased because of the role it plays in achievin...
Bettina Kemme, Gustavo Alonso