Sciweavers

329 search results - page 44 / 66
» The Dangers of Replication and a Solution
Sort
View
IROS
2006
IEEE
163views Robotics» more  IROS 2006»
15 years 7 months ago
Robotic On-Orbit Servicing - DLR's Experience and Perspective
The increasing number of launched satellites per year, calls for solutions to keep free operational space for telecommunication systems in geo-synchronized orbit, as well as to av...
Klaus Landzettel, Carsten Preusche, Alin Albu-Sch&...
ACNS
2004
Springer
247views Cryptology» more  ACNS 2004»
15 years 7 months ago
Low-Latency Cryptographic Protection for SCADA Communications
Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors includi...
Andrew K. Wright, John A. Kinast, Joe McCarty
NSDI
2008
15 years 4 months ago
Phalanx: Withstanding Multimillion-Node Botnets
Large-scale distributed denial of service (DoS) attacks are an unfortunate everyday reality on the Internet. They are simple to execute and with the growing prevalence and size of...
Colin Dixon, Thomas E. Anderson, Arvind Krishnamur...
CASES
2005
ACM
15 years 3 months ago
Segment protection for embedded systems using run-time checks
The lack of virtual memory protection is a serious source of unreliability in many embedded systems. Without the segment-level protection it provides, these systems are subject to...
Matthew Simpson, Bhuvan Middha, Rajeev Barua
OPODIS
2003
15 years 3 months ago
Multiple Agents RendezVous in a Ring in Spite of a Black Hole
The Rendezvous of anonymous mobile agents in a anonymous network is an intensively studied problem; it calls for k anonymous, mobile agents to gather in the same site. We study thi...
Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe,...