25,450 Hits in 6.1 sec

Exploiting two-case delivery for fast protected messaging

K. Mackenzie, J. Kubiatowicz, M. Frank, W. Lee, V. Lee, A. Agarwal, M.F. Kaashoek
Proceedings 1998 Fourth International Symposium on High-Performance Computer Architecture  
First, two-case delivery allows an application to receive a message directly from the network hardware in ordinary circumstances, but provides buffering transparently when required for protection.  ...  We propose and evaluate two complementary techniques to protect and virtualize a tightly-coupled network interface in a multicomputer.  ...  Acknowledgements We would like to thank Robert Bedichek for the fast simulator, Jon Michelson for his work in the design and implementation of the UCU FPGA and Kirk Johnson for the CRL and enum benchmarks  ... 
doi:10.1109/hpca.1998.650562 dblp:conf/hpca/MackenzieKFLLAK98 fatcat:cdsykxvxuncavifo2mrkug2nr4

Tampering with the Delivery of Blocks and Transactions in Bitcoin

Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
More specifically, we show that an adversary can exploit these measures in order to effectively delay the propagation of transactions and blocks to specific nodes-without causing a network partitioning  ...  DELAYING INFORMATION DELIVERY In this section, we show how an adversary can exploit the scalability measures adopted in Bitcoin in order to delay the delivery of message advertisements.  ...  For A, these three cases generate two, one and zero block rewards, respectively. Second, A can find a second block and also keep it secret, moving to state 2.  ... 
doi:10.1145/2810103.2813655 dblp:conf/ccs/GervaisRKC15 fatcat:jr7gkmcoujh4ph5ek35br3xmxy

Architecture for an Automatic Customized Warning System

Mirko Montanari, Sharad Mehrotra, Nalini Venkatasubramanian
2007 2007 IEEE Intelligence and Security Informatics  
In this paper we describe the design and the implementation of PWS (Policy-driven Warning System), a system for public warning dissemination.  ...  Public communication during natural and manmade disasters is a key issue that must be addressed to protect lives and properties.  ...  Though, keeping this information current is fundamental for the efficacy of the system.  ... 
doi:10.1109/isi.2007.379530 dblp:conf/isi/MontanariMV07 fatcat:bhoterxz45cbfckkqeyxczshju

Reliable Traffic Information Propagation in Vehicular Ad Hoc Networks [chapter]

Soyoung Park, Cliff Zou, Damla Turgut
2009 Security in Ad Hoc and Sensor Networks  
It relies on the time delay between these two messages and the mobility of vehicles to protect data integrity.  ...  This approach exploits the fact that it is difficult and costly to have two collaborative vehicles on both driving directions in the same region.  ...  Our approaches exploit the unique features of bidirectional roadway and fast moving vehicles to protect traffic information propagation in a VANET.  ... 
doi:10.1142/9789814271097_0009 fatcat:afat5jjhjvhutabx6ddfhozc7u

Reliable Traffic Information Propagation in Vehicular Ad-Hoc Networks

Soyoung Park, Cliff C. Zou
2008 2008 IEEE Sarnoff Symposium  
It relies on the time delay between these two messages and the mobility of vehicles to protect data integrity.  ...  This approach exploits the fact that it is difficult and costly to have two collaborative vehicles on both driving directions in the same region.  ...  Our approaches exploit the unique features of bidirectional roadway and fast moving vehicles to protect traffic information propagation in a VANET.  ... 
doi:10.1109/sarnof.2008.4520100 fatcat:e4cme356rze6na6dbaln5vvvq4

Implementing protected multi-user communication for Myrinet [chapter]

Shailabh Nagar, Dale Seed, Anand Sivasubramaniam
1998 Lecture Notes in Computer Science  
This overhead is a direct result of the cost that a message incurs as it travels through different protection domains.  ...  This paper presents a description of the design, implementation and performance of a protected user-level messaging system over Myrinet, called MU-Net, that can handle multiple application processes concurrently  ...  Trapeze [12] exploits the decoupling of these DMA operations through a mechanism called cut-through delivery.  ... 
doi:10.1007/bfb0052205 fatcat:b4oilctusrbhflyg3ffx3ycope

GasNet: Efficient Residential Building Gas Leak Monitoring via Opportunistic Networking

Zenghua Zhao, Xin Zhang, Xuanxuan Wu, Xiang-Yang Li, Junze Han
2014 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems  
GasNet is a sensor network for real-timely monitoring the gas leak in residential buildings, in order to efficiently protect the buildings from gas leak explosion.  ...  GasNet provides low-latency and reliable gas leak ALARM message delivery in complicated RF environments.  ...  ROAP achieves 100% delivery ratio at the case of node failure, the other two has different decrease.  ... 
doi:10.1109/mass.2014.44 dblp:conf/mass/ZhaoZWLH14 fatcat:lo34zwtr2jdphgpfmok7o2bokq

An MPLS-Based Micro-mobility Solution [chapter]

Rajendra Persaud, Ralf Wienzek, Gerald Berghoff, Ralf Schanko
2006 Lecture Notes in Computer Science  
This support may be provided with the help of IEEE 802.21 that is exploited for intra-technology handovers in WLANs in this paper.  ...  The outage period due to the handover is smaller for predictive solutions. However, in order to be predictive, a L3 mobility solution needs support from the underlying link-layer.  ...  While MIPv4 and HMIPv6 are exploited to provide the signalling necessary for mobility management, MPLS is exploited instead of IP encapsulation for data delivery on the user plane.  ... 
doi:10.1007/11753810_96 fatcat:r6zlbwczlncuvpxhqzocccgxoq

A fountain codes-based data dissemination technique in vehicular Ad-hoc networks

Veronica Palma, Elena Mammi, Anna Maria Vegni, Alessandro Neri
2011 2011 11th International Conference on ITS Telecommunications  
This technique combines application layer channel coding based on Luby Transform (LT) codes with multicast delivery in a wireless network exploiting PUMA (Protocol for Unified Multicasting through Announcements  ...  We investigate the reliability of a real-time service and data delivery for multicast transmission over lossy Vehicular Ad-hoc NETworks (VANETs).  ...  Basically, we present a two-steps algorithm for efficient data delivery, such as (i) each packet flow is protected by an LT code and is sent to intermediate destination vehicles (i.e. relay nodes); (ii  ... 
doi:10.1109/itst.2011.6060154 fatcat:ipdvob3ebzdvjg5qrjxbc4evgq

Co-Simulation of Smart Distribution Network Fault Management and Reconfiguration with LTE Communication

Michele Garau, Emilio Ghiani, Gianni Celli, Fabrizio Pilo, Sergio Corti
2018 Energies  
power system protections.  ...  for engineering smart grids from use case design to field deployment [10] .  ...  Figure 11 shows the performances in terms of packet delivery ratios and coverage with variable active users per cell for typical LTE usage in a dense urban scenario with optimal exploitation of LTE network  ... 
doi:10.3390/en11061332 fatcat:moqcr5sbbfcp7oxf7zakihtdte

An Empirical Study of Communication Infrastructures Towards the Smart Grid: Design, Implementation, and Evaluation

Xiang Lu, Wenye Wang, Jianfeng Ma
2013 IEEE Transactions on Smart Grid  
Within the real-setting testbed, we measure the message delivery performance of the DNP3-based communication infrastructure.  ...  The smart grid features ubiquitous interconnections of power equipments to enable two-way flows of electricity and information for various intelligent power management applications, such as accurate relay  ...  message delivery for control commands [41] .  ... 
doi:10.1109/tsg.2012.2225453 fatcat:lbqk6ilewndpfk3fzx5mkzunnq

Evaluating Multicast Message Authentication Protocols for Use in Wide Area Power Grid Data Delivery Services

Carl H. Hauser, Thanigainathan Manivannan, David E. Bakken
2012 2012 45th Hawaii International Conference on System Sciences  
Furthermore, the use of the data for important power grid control functions requires each message's source be authenticated, leading to the need for multicast message authentication.  ...  Modern computer communication technologies make it possible to create very flexible Data delivery service (DDS) design that can efficiently meet the quality-of-service needs of a wide variety of power  ...  Indeed, they increase end-to-end delivery latencies to rule out some of the very fast applications such as Line Current Differential Protection [26] and the faster of system integrity protection schemes  ... 
doi:10.1109/hicss.2012.253 dblp:conf/hicss/HauserMB12 fatcat:ks7ozo66qvanjpmbgna6m5em6e

Where does transport layer fit into space DTN architecture?

Giorgos Papastergiou, Christos V. Samaras, Vassilis Tsaoussidis
2010 2010 5th Advanced Satellite Multimedia Systems Conference and the 11th Signal Processing for Space Communications Workshop  
In that context, we highlight features from DS-TP and DTTP that correspond to the requirements of transport protocols for space.  ...  Bundle Protocol along with its convergence layer protocols transform end-to-end reliability into questionable hop-by-hop reliable communication and imposes a two-tier routing policy that allows flexible  ...  DAR allows for efficient and fast retransmission of corrupted data packets.  ... 
doi:10.1109/asms-spsc.2010.5586851 fatcat:lfshefhlmzabhg6w6pjy5dts2i

CoDaaS: An experimental cloud-centric content delivery platform for user-generated contents

Yichao Jin, Yonggang Wen, Guangyu Shi, Guoqiang Wang, A. V. Vasilakos
2012 2012 International Conference on Computing, Networking and Communications (ICNC)  
The preliminary results validate all the required features for UGC delivery and verify its comparative performance advantages.  ...  This paper proposes contentdelivery-as-a-service (CoDaaS), an innovative idea to enable ondemand virtual content delivery service (vCDS) overlays for UGC providers to deliver their contents to a group  ...  We choose to use the TLV format, because fast TLV parsers, for example, tlve [26] , can be leveraged for fast message processing and the bit efficiency of TLV format is comparatively higher to reduce  ... 
doi:10.1109/iccnc.2012.6167562 dblp:conf/iccnc/JinWSWV12 fatcat:tzq2lvchcfhktpknmohnrywdiy

Fast and automated generation of attack signatures

Zhenkai Liang, R. Sekar
2005 Proceedings of the 12th ACM conference on Computer and communications security - CCS '05  
In this paper, we develop a new approach that can provide effective protection against a vast majority of these attacks that exploit memory errors in C/C++ programs.  ...  Our approach introduces low overheads (under 10%), does not require access to source code of the protected server, and has successfully generated signatures for the attacks studied in our experiments,  ...  We thank the anonymous reviewers for their comments, which are very helpful in preparing the final version of this paper.  ... 
doi:10.1145/1102120.1102150 dblp:conf/ccs/LiangS05 fatcat:4ghu5uip5vhajjnkm3oi3ksqym
« Previous Showing results 1 — 15 out of 25,450 results