The authors shall propose a secure, efficient, and non-interactive deniable authentication protocol in which a receiver cannot prove the source of a message to a third party. The proposed protocol is much more secure ...
详细信息
ISBN:
(纸本)0889865876
The authors shall propose a secure, efficient, and non-interactive deniable authentication protocol in which a receiver cannot prove the source of a message to a third party. The proposed protocol is much more secure and efficient than existing protocols. It also satisfies all of the requirements of an ideal deniable authentication protocol.
This paper presents ViSe, a virtual security testbed, and demonstrates how it can be used to efficiently study computer attacks and suspect tools as part of a computer crime reconstruction. Based on a hypothesis of th...
详细信息
This paper presents two novel generic adaptive batching schemes for replicated servers. Both schemes are oblivious to the underlying communication protocols. Our novel schemes adapt their batching levels automatically...
详细信息
This paper presents two novel generic adaptive batching schemes for replicated servers. Both schemes are oblivious to the underlying communication protocols. Our novel schemes adapt their batching levels automatically and immediately according to the current communication load. This is done without any explicit monitoring or calibration of the system. Additionally, the paper includes a detailed performance evaluation
We introduce fault-tolerant on-chip routing philosophy for two-dimensional meshes. It is an extension to the concept of packet connected circuit, PCC. In order to increase reliability we have designed an automatic rer...
详细信息
We introduce fault-tolerant on-chip routing philosophy for two-dimensional meshes. It is an extension to the concept of packet connected circuit, PCC. In order to increase reliability we have designed an automatic rerouting property to a single switch node and added return channel to the communication route. An autonomic routing switch node is modeled asynchronously and implemented using Haste language. The logical functionality of routing is illustrated as a single study case in 7*8 mesh. The routing success is further analyzed in congesting and faulty environment
Naïve Bayes classifiers are a very simple, but often effective tool for classification problems, although they are based on independence assumptions that do not hold in most cases. Extended naïve Bayes class...
详细信息
We present an approach for analysing and improving fault-tolerance aspects in radio architectures. This is a necessary step to be taken in order to implement reliable radio systems in future nanoscale technologies. We...
详细信息
We present an approach for analysing and improving fault-tolerance aspects in radio architectures. This is a necessary step to be taken in order to implement reliable radio systems in future nanoscale technologies. We present problem formulation, optimisation approach and implementation methodology. We are adding fault tolerance at architecture level by taking advantage of existing parallel structures and using a spare module approach in order to minimise hardware overhead needed. These issues have been analysed and demonstrated using two radio case studies: a UMTS MIMO and a GSM diversity receivers.
The rapid growth of on-line information including multimedia contents during the last decade caused a major problem for Web users - there is too much information available, most of it poorly organized and hard to find...
详细信息
We compare the capacity requirements of two new end-to-end (e2e) protection switching mechanisms: the self-protecting multipath (SPM) and several (multi-)path protection (PP) methods. Their structure consists of disjo...
详细信息
We compare the capacity requirements of two new end-to-end (e2e) protection switching mechanisms: the self-protecting multipath (SPM) and several (multi-)path protection (PP) methods. Their structure consists of disjoint parallel e2e paths and the traffic is distributed over these paths according to a load balancing function. If one of the paths fails, the traffic is redistributed to the working paths according to a path failure specific load balancing function. The contribution of this work is the calculation of the path layout and the load balancing functions for both the PP and the SPM method. We use exact optimizations and simple heuristics for that objective and take a dimensioning approach to compare the capacity requirements of the different mechanisms. Our results illustrate, e.g., that the savings potential depends on the network topology and that 17% additional capacity can be sufficient for full resilience against all single router and link failures in well designed networks
The versatile MOdeling, Specification and Evaluation Language is the core element of the MOSEL-2 tool. This description languages provides a high-level means for specifying models, performance measures, and the graphi...
详细信息
The versatile MOdeling, Specification and Evaluation Language is the core element of the MOSEL-2 tool. This description languages provides a high-level means for specifying models, performance measures, and the graphical presentation of results. The description languages is implemented in form of an evaluation environment that comprises translators to the modeling languages of several third-party performance evaluation tools that evaluate the specified model.
In spite of significant work on real-time content distribution, providing consistent service quality across the Internet remains a challenge. Multicast applications further exacerbate that problem as the number of par...
详细信息
In spite of significant work on real-time content distribution, providing consistent service quality across the Internet remains a challenge. Multicast applications further exacerbate that problem as the number of participants-clients, providers and administrative domains-and the level of heterogeneity in a single session is increased. Recently the increasing complexity of managing and operating the Internet has sparked off interest in autonomous networking. In this paper, we introduce vital enhancements to the elementary single source multicast service that facilitates incremental deployment, self-configuration, self-optimization and self-healing. We further introduce an autonomic multicast architecture where a self-monitoring network layer multicast automatically adapts the network layer forwarding service to meet the service quality requirements requested by application level services.
暂无评论