Sciweavers

2947 search results - page 528 / 590
» The timely token protocol
Sort
View
122
Voted
ACSAC
2010
IEEE
15 years 2 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
132
Voted
EMSOFT
2010
Springer
15 years 2 months ago
Reducing stack with intra-task threshold priorities in real-time systems
In the design of hard real-time systems, the feasibility of the task set is one of the primary concerns. However, in embedded systems with scarce resources, optimizing resource us...
Gang Yao, Giorgio C. Buttazzo
FOCS
2010
IEEE
15 years 2 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
149
Voted
ICCAD
2010
IEEE
117views Hardware» more  ICCAD 2010»
15 years 2 months ago
A synthesis flow for digital signal processing with biomolecular reactions
Abstract--We present a methodology for implementing digital signal processing (DSP) operations such as filtering with biomolecular reactions. From a DSP specification, we demonstra...
Hua Jiang, Aleksandra P. Kharam, Marc D. Riedel, K...
INFOCOM
2010
IEEE
15 years 2 months ago
Predicting Prefix Availability in the Internet
The Border Gateway Protocol (BGP) maintains inter-domain routing information by announcing and withdrawing IP prefixes, possibly resulting in temporary prefix unreachability. Prefi...
Ravish Khosla, Sonia Fahmy, Y. Charlie Hu, Jennife...