Sciweavers

2213 search results - page 346 / 443
» Software Security
Sort
View
JCIT
2010
130views more  JCIT 2010»
14 years 10 months ago
Research on Simulation and Optimization of Transshipment Port Operation in a Power Coal Ocean Shipping Logistics System on the B
With China's rapid economic development, electricity supply is relatively shortage, and the contradiction of power coal supply and demand is prominent. In this context, using...
Yabin Li
TC
2010
14 years 10 months ago
Faster Interleaved Modular Multiplication Based on Barrett and Montgomery Reduction Methods
This paper proposes two improved interleaved modular multiplication algorithms based on Barrett and Montgomery modular reduction. The algorithms are simple and especially suitable ...
Miroslav Knezevic, Frederik Vercauteren, Ingrid Ve...
97
Voted
WOSP
2004
ACM
15 years 8 months ago
Generating realistic workloads for network intrusion detection systems
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to deter...
Spyros Antonatos, Kostas G. Anagnostakis, Evangelo...
JSAC
2007
95views more  JSAC 2007»
15 years 3 months ago
Experiences in implementing an experimental wide-area GMPLS network
In this article, we describe our experiences in implementing an experimental wide-area GMPLS network called CHEETAH (Circuit-Switched End-to-End Transport Architecture). The key c...
Xiangfei Zhu, Xuan Zheng, Malathi Veeraraghavan
ICFEM
2009
Springer
15 years 10 months ago
Combining Static Model Checking with Dynamic Enforcement Using the Statecall Policy Language
Internet protocols encapsulate a significant amount of state, making implementing the host software complex. In this paper, we define the Statecall Policy Language (SPL) which pr...
Anil Madhavapeddy