Sciweavers

4306 search results - page 689 / 862
» Timed Testing with TorX
Sort
View
WEA
2010
Springer
284views Algorithms» more  WEA 2010»
15 years 10 months ago
Paging Multiple Users in Cellular Network: Yellow Page and Conference Call Problems
Abstract. Mobile users are roaming in a zone of cells in a cellular network system. The probabilities of each user residing in each cell are known, and all probabilities are indepe...
Amotz Bar-Noy, Panagiotis Cheilaris, Yi Feng 0002
ICC
2008
IEEE
128views Communications» more  ICC 2008»
15 years 9 months ago
Experimental Analysis of Super-Seeding in BitTorrent
—With the popularity of BitTorrent, improving its performance has been an active research area. Super-seeding, a special upload policy for initial seeds, improves the efficiency ...
Zhijia Chen, Yang Chen, Chuang Lin, Vaibhav Nivarg...
SP
2008
IEEE
112views Security Privacy» more  SP 2008»
15 years 9 months ago
XFA: Faster Signature Matching with Extended Automata
Automata-based representations and related algorithms have been applied to address several problems in information security, and often the automata had to be augmented with additi...
Randy Smith, Cristian Estan, Somesh Jha
CODES
2007
IEEE
15 years 9 months ago
Scheduling and voltage scaling for energy/reliability trade-offs in fault-tolerant time-triggered embedded systems
In this paper we present an approach to the scheduling and voltage scaling of low-power fault-tolerant hard real-time applications mapped on distributed heterogeneous embedded sys...
Paul Pop, Kåre Harbo Poulsen, Viacheslav Izo...
115
Voted
ESORICS
2007
Springer
15 years 9 months ago
Cloak: A Ten-Fold Way for Reliable Covert Communications
A number of network covert channels have been proposed recently that may have important ramifications for Internet security and privacy. However, they could become ineffective in...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang