Computer Networks Laboratory

Results: 291



#Item
141

Mixed-Criticality Runtime Mechanisms and Evaluation on Multicores Lukas Sigrist, Georgia Giannopoulou, Pengcheng Huang, Andres Gomez, Lothar Thiele Computer Engineering and Networks Laboratory, ETH Zurich, 8092 Zurich, S

Add to Reading List

Source URL: www.tik.ethz.ch

Language: English - Date: 2015-02-26 09:02:08
    142

    The Privacy Jungle: On the Market for Data Protection in Social Networks Joseph Bonneau Computer Laboratory University of Cambridge

    Add to Reading List

    Source URL: weis09.infosecon.net

    Language: English - Date: 2013-09-01 23:23:37
      143Game theory / Computing / File sharing / Intellectual property law / Peer-to-peer / Social peer-to-peer processes / Price of stability / Price of anarchy / Scalability / Technology / Politics

      On the Topologies Formed by Selfish Peers Thomas Moscibroda, Stefan Schmid, Roger Wattenhofer {moscitho, schmiste, wattenhofer}@tik.ee.ethz.ch Computer Engineering and Networks Laboratory, ETH Zurich, Switzerland ABSTRAC

      Add to Reading List

      Source URL: iptps06.cs.ucsb.edu

      Language: English - Date: 2006-02-15 01:41:08
      144Scheduling algorithms / Nuclear technology / Nuclear physics / Radioactivity / Planning / Scheduling / Criticality

      Service Adaptions for Mixed-Criticality Systems TIK Report No. 350 Pengcheng Huang, Georgia Giannopoulou, Nikolay Stoimenov, Lothar Thiele Computer Engineering and Networks Laboratory, ETH Zurich firstname.lastname@tik.e

      Add to Reading List

      Source URL: www.tik.ethz.ch

      Language: English - Date: 2014-10-27 20:04:04
      145

      Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping Mario Strasser∗ Computer Eng. and Networks Laboratory ETH Zurich, Switzerland

      Add to Reading List

      Source URL: www.poepper.net

      Language: English - Date: 2013-07-04 09:30:05
        146

        So You Want to Take Over a Botnet... David Dittrich Applied Physics Laboratory University of Washington Abstract Computer criminals regularly construct large distributed attack networks comprised of many thousands

        Add to Reading List

        Source URL: staff.washington.edu

        Language: English - Date: 2012-03-27 18:48:52
          147

          Connection-oriented Multicasting in Wormhole-switched Networks on Chip Zhonghai Lu, Bei Yin and Axel Jantsch Laboratory of Electronics and Computer Systems Royal Institute of Technology, Sweden fzhonghai,.s

          Add to Reading List

          Source URL: www.ece.rice.edu

          Language: English - Date: 2014-03-26 12:04:26
            148

            A power efficient flit-admission scheme for wormhole-switched networks on chip Zhonghai Lu, Li Tong, Bei Yin and Axel Jantsch Laboratory of Electronics and Computer Systems Royal Institute of Technology, Sweden fzhonghai

            Add to Reading List

            Source URL: www.ece.rice.edu

            Language: English - Date: 2014-03-26 12:04:24
              149

              Ikarus: Large-Scale Participatory Sensing at High Altitudes Michael von Kaenel, Philipp Sommer, and Roger Wattenhofer Computer Engineering and Networks Laboratory ETH Zurich, Switzerland {vkaenemi,sommer,wattenhofer}@ti

              Add to Reading List

              Source URL: www.dcg.ethz.ch

              Language: English - Date: 2014-09-26 08:36:24
                150

                An Event-Synchronization Protocol for Parallel Simulation of Large-Scale Wireless Networks Clinton Kelly, IV; Rajit Manohar Computer Systems Laboratory Cornell University Ithaca NY 14853, U.S.A.

                Add to Reading List

                Source URL: vlsi.cornell.edu

                Language: English - Date: 2014-08-03 12:18:20
                  UPDATE