Sciweavers

2947 search results - page 127 / 590
» The timely token protocol
Sort
View
PERCOM
2004
ACM
16 years 4 months ago
One-Time Capabilities for Authorizations without Trust
This paper introduces and solves a security problem of pervasive computing: how to define authorizations for offline interactions when trust relationships among entities do not ex...
Laurent Bussard, Refik Molva
SEUS
2008
IEEE
15 years 11 months ago
On Scalable Synchronization for Distributed Embedded Real-Time Systems
Abstract. We consider the problem of programming distributed embedded real-time systems with distributed dependencies. We show that the de facto standard of using locks and conditi...
Sherif Fadel Fahmy, Binoy Ravindran, E. Douglas Je...
153
Voted
ICPADS
2005
IEEE
15 years 10 months ago
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access
In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Yusuf Uzunay, Kemal Bicakci
FORMATS
2003
Springer
15 years 10 months ago
Discrete-Time Rewards Model-Checked
Abstract. This paper presents a model-checking approach for analyzing discrete-time Markov reward models. For this purpose, the temporal logic probabilistic CTL is extended with re...
Suzana Andova, Holger Hermanns, Joost-Pieter Katoe...
LCN
2000
IEEE
15 years 9 months ago
The Performance of Ethernet under a Combined Data/Real-Time Traffic
In this paper, we investigate the performance of an IEEE802.3 shared-bandwidth hub under a mixed data/real-time traffic load. For the regular data nodes we assume an exponentially...
Mokhtar Aboelaze, Ayman Elnaggar