Sciweavers

5128 search results - page 69 / 1026
» When Abstraction Fails
Sort
View
CSFW
2005
IEEE
15 years 3 months ago
Reconstruction of Attacks against Cryptographic Protocols
We study an automatic technique for the verification of cryptographic protocols based on a Horn clause model of the protocol. This technique yields proofs valid for an unbounded ...
Xavier Allamigeon, Bruno Blanchet
MSE
2002
IEEE
106views Hardware» more  MSE 2002»
15 years 2 months ago
A Realtime Software Solution for Resynchronizing Filtered MPEG2 Transport Stream
With the increasing demand and popularity of multimedia streaming applications over the current Internet, manipulating MPEG streams in a real-time software manner is gaining more ...
Bin Yu, Klara Nahrstedt
SIGMETRICS
1993
ACM
106views Hardware» more  SIGMETRICS 1993»
15 years 1 months ago
Software Performance Engineering
: Performance is critical to the success of today’s software systems. However, many software products fail to meet their performance objectives when they are initially constructe...
Connie U. Smith
BROADNETS
2004
IEEE
15 years 1 months ago
The Case for Multipath Multimedia Transport over Wireless Ad Hoc Networks
Real-time multimedia transport has stringent bandwidth, delay, and loss requirements. Supporting this application in current wireless ad hoc networks is a challenge. Such networks...
Yihan Li, Shiwen Mao, Shivendra S. Panwar
DSN
2004
IEEE
15 years 1 months ago
Improving System Dependability with Functional Alternatives
We present the concept of alternative functionality for improving dependability in distributed embedded systems. Alternative functionality is a mechanism that complements traditio...
Charles P. Shelton, Philip Koopman