Sciweavers

21520 search results - page 80 / 4304
» Symmetric network computation
Sort
View
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
15 years 11 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
SIGECOM
2005
ACM
134views ECommerce» more  SIGECOM 2005»
15 years 11 months ago
Congestion games with failures
We introduce a new class of games, congestion games with failures (CGFs), which extends the class of congestion games to allow for facility failures. In a basic CGF (BCGF) agents ...
Michal Penn, Maria Polukarov, Moshe Tennenholtz
MOBIHOC
2006
ACM
16 years 5 months ago
Topology control meets SINR: : the scheduling complexity of arbitrary topologies
To date, topology control in wireless ad hoc and sensor networks--the study of how to compute from the given communication network a subgraph with certain beneficial properties--h...
Thomas Moscibroda, Roger Wattenhofer, Aaron Zollin...
PERCOM
2006
ACM
16 years 5 months ago
Analysis of Appropriate Timing for Information Notification Based on Indoor User's Location Transition
The purpose of this study was to explore the convenient timing for information notification of the users in their daily life. Using the location and the time interval since a loca...
Vlaho Kostov, Takashi Tajima, Eiichi Naito, Jun Oz...
SIGCOMM
2004
ACM
15 years 10 months ago
SPV: secure path vector routing for securing BGP
As our economy and critical infrastructure increasingly relies on the Internet, the insecurity of the underlying border gateway routing protocol (BGP) stands out as the Achilles h...
Yih-Chun Hu, Adrian Perrig, Marvin A. Sirbu