Sciweavers

1737 search results - page 118 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
151
Voted
DAC
2010
ACM
15 years 16 days ago
Tradeoff analysis and optimization of power delivery networks with on-chip voltage regulation
Integrating a large number of on-chip voltage regulators holds the promise of solving many power delivery challenges through strong local load regulation and facilitates systemlev...
Zhiyu Zeng, Xiaoji Ye, Zhuo Feng, Peng Li
ESA
2003
Springer
81views Algorithms» more  ESA 2003»
15 years 7 months ago
Optimal Dynamic Video-on-Demand Using Adaptive Broadcasting
We consider the transmission of a movie over a broadcast network to support several viewers who start watching at arbitrary times, after a wait of at most twait minutes. A recent a...
Therese C. Biedl, Erik D. Demaine, Alexander Golyn...
112
Voted
CONEXT
2007
ACM
15 years 6 months ago
Internet economics: the use of Shapley value for ISP settlement
Within the current Internet, autonomous ISPs implement bilateral agreements, with each ISP establishing agreements that suit its own local objective to maximize its profit. Peerin...
Richard T. B. Ma, Dah-Ming Chiu, John C. S. Lui, V...
JDFP
2008
81views more  JDFP 2008»
15 years 2 months ago
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information securi...
Gary C. Kessler
122
Voted
CSFW
2007
IEEE
15 years 9 months ago
Reasoning about Concurrency for Security Tunnels
There has been excellent progress on languages for rigorously describing key exchange protocols and techniques for proving that the network security tunnels they establish preserv...
Alwyn Goodloe, Carl A. Gunter