Sciweavers

2947 search results - page 9 / 590
» The timely token protocol
Sort
View
FOSSACS
2009
Springer
15 years 4 months ago
Minimal Cost Reachability/Coverability in Priced Timed Petri Nets
Abstract. We extend discrete-timed Petri nets with a cost model that assigns token storage costs to places and firing costs to transitions, and study the minimal cost reachability...
Parosh Aziz Abdulla, Richard Mayr
CCR
2004
79views more  CCR 2004»
14 years 9 months ago
Preventing Internet denial-of-service with capabilities
In this paper, we propose a new approach to preventing and constraining denial-of-service (DoS) attacks. Instead of being able to send anything to anyone at any time, in our archi...
Thomas E. Anderson, Timothy Roscoe, David Wetheral...
96
Voted
DEXAW
2006
IEEE
132views Database» more  DEXAW 2006»
15 years 3 months ago
Tokens for Anonymous Communications in the Internet
With the growth and acceptance of the Internet, there has been increased interest in maintaining anonymity in the network. Using traffic analysis, it is possible to infer who is t...
Arjan Durresi, Vamsi Paruchuri, Leonard Barolli, R...
ASYNC
2000
IEEE
138views Hardware» more  ASYNC 2000»
15 years 1 months ago
Low-Latency Asynchronous FIFO's Using Token Rings
This paper presents several new asynchronous FIFO designs. While most existing FIFO’s trade higher throughput for higher latency, our goal is to achieve very low latency while m...
Tiberiu Chelcea, Steven M. Nowick
INFORMATICALT
2010
132views more  INFORMATICALT 2010»
14 years 6 months ago
An Improved Securer and Efficient Nonce-Based Authentication Scheme with Token-Update
In this paper, we propose a mutual authentication scheme using nonce variable instead of Mac address and accompanying with token updates to improve the functionality. Lee et al. (2...
Chiu-Hsiung Liao, Ching-Te Wang, Hon-Chan Chen