Sciweavers

15 search results - page 1 / 3
» nca 2009
Sort
View
77
Voted
NCA
2009
IEEE
15 years 5 months ago
Optimizations of Large Receive Offload in Xen
Fumio Nakanjima, Hitoshi Oi
61
Voted
NCA
2009
IEEE
15 years 5 months ago
TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory
Xiaokang Xiong, Duncan S. Wong, Xiaotie Deng
100
Voted
APPROX
2009
Springer
195views Algorithms» more  APPROX 2009»
15 years 5 months ago
Approximating Node-Connectivity Augmentation Problems
The (undirected) Node Connectivity Augmentation (NCA) problem is: given a graph J = (V, EJ ) and connectivity requirements {r(u, v) : u, v ∈ V }, find a minimum size set I of n...
Zeev Nutov
81
Voted
NCA
2009
IEEE
15 years 5 months ago
From Auto-adaptive to Survivable and Self-Regenerative Systems
—This paper charts the course of adaptive behavior in intrusion tolerance, starting from pre-programmed and usercontrolled reactive adaptation to highly sophisticated autonomic a...
Michael Atighetchi, Partha Pratim Pal
84
Voted
NCA
2009
IEEE
15 years 5 months ago
Attribute-Based Prevention of Phishing Attacks
Abstract—This paper describes a set of innovative attributebased checks for defending against phishing attacks1 . We explain a number of anti-phishing algorithms implemented as p...
Michael Atighetchi, Partha Pratim Pal