-
1
-
-
23344432021
-
Prioritised best effort routing with four quality of service metrics applying the concept of the analytic hierarchy process
-
A. M. S. Alkahtani, M. E. Woodward, and K. Al-Begain. Prioritised best effort routing with four quality of service metrics applying the concept of the analytic hierarchy process. Comput. Oper. Res., 33(3):559-580, 2006.
-
(2006)
Comput. Oper. Res
, vol.33
, Issue.3
, pp. 559-580
-
-
Alkahtani, A.M.S.1
Woodward, M.E.2
Al-Begain, K.3
-
2
-
-
33748300805
-
Battery power-aware encryption
-
R. Chandramouli, S. Bapatla, K. P. Subbalakshmi, and R. N. Uma. Battery power-aware encryption. ACM Trans. Inf. Syst. Secur., 9(2):162-180, 2006.
-
(2006)
ACM Trans. Inf. Syst. Secur
, vol.9
, Issue.2
, pp. 162-180
-
-
Chandramouli, R.1
Bapatla, S.2
Subbalakshmi, K.P.3
Uma, R.N.4
-
4
-
-
0036279178
-
Dynamic service negotiation protocol (dsnp) and wireless diffserv
-
28 April-2 May
-
J.-C. Chen, A. McAuley, V. Sarangan, S. Baba, and Y. Ohba. Dynamic service negotiation protocol (dsnp) and wireless diffserv. In Proc. IEEE International Conference on Communications ICC 2002, volume 2, pages 1033-1038, 28 April-2 May 2002.
-
(2002)
Proc. IEEE International Conference on Communications ICC 2002
, vol.2
, pp. 1033-1038
-
-
Chen, J.-C.1
McAuley, A.2
Sarangan, V.3
Baba, S.4
Ohba, Y.5
-
5
-
-
72249123138
-
-
i. W. Chenx and W. William. Towards a framework for security measurements. In 20th National Information Systems Security Conference (NISSC), Baltimore, Maryland, October 1997.
-
i. W. Chenx and W. William. Towards a framework for security measurements. In 20th National Information Systems Security Conference (NISSC), Baltimore, Maryland, October 1997.
-
-
-
-
6
-
-
72249098311
-
Self-adaptive security at application level: A proposal
-
A. Ferrante, A. V. Taddeo, M. Sami, F. Mantovani, and J. Fridkins. Self-adaptive security at application level: a proposal. In Reconfigurable Communication-centric SoCs (ReCoSoC), 2007.
-
(2007)
Reconfigurable Communication-centric SoCs (ReCoSoC)
-
-
Ferrante, A.1
Taddeo, A.V.2
Sami, M.3
Mantovani, F.4
Fridkins, J.5
-
7
-
-
72249102981
-
The energy cost of ssl in deeply embedded systems
-
Technical Report TR-2008-173, SUN Microsystems, June
-
V. Gupta and M. Wurm. The energy cost of ssl in deeply embedded systems. Technical Report TR-2008-173, SUN Microsystems, June 2008.
-
(2008)
-
-
Gupta, V.1
Wurm, M.2
-
9
-
-
0033719421
-
Wattch: A framework for architectural-level power analysis and optimizations
-
M. Martonosi, V. Tiwari, and D. Brooks. Wattch: A framework for architectural-level power analysis and optimizations. Computer Architecture, International Symposium on, 0:83, 2000.
-
(2000)
Computer Architecture, International Symposium on
, vol.0
, pp. 83
-
-
Martonosi, M.1
Tiwari, V.2
Brooks, D.3
-
10
-
-
72249120349
-
Use of multi-attribute utility functions in evaluating security systems
-
Technical Report LLNL-TR-405048, Lawrence Livermore National Laboratory LLNL, Livermore, CA, June, 13
-
C. Meyers, A. Lamont, and A. Sicherman. Use of multi-attribute utility functions in evaluating security systems. Technical Report LLNL-TR-405048, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, June, 13 2008.
-
(2008)
-
-
Meyers, C.1
Lamont, A.2
Sicherman, A.3
-
11
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
Feb
-
N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha. A study of the energy consumption characteristics of cryptographic algorithms and security protocols. Mobile Computing, IEEE Transactions on, 5(2):128-143, Feb. 2006.
-
(2006)
Mobile Computing, IEEE Transactions on
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.1
Ravi, S.2
Raghunathan, A.3
Jha, N.4
-
12
-
-
0003443508
-
-
McGraw-Hill, New york
-
T. Saaty. The Analytic Hierarchy Process, Planning, Piority Setting, Resource Allocation. McGraw-Hill, New york, 1980.
-
(1980)
The Analytic Hierarchy Process, Planning, Piority Setting, Resource Allocation
-
-
Saaty, T.1
-
13
-
-
33645354309
-
Comparative study of protocols for dynamic service negotiation in the next-generation internet
-
March
-
V. Sarangan and J.-C. Chen. Comparative study of protocols for dynamic service negotiation in the next-generation internet. IEEE, Communications Magazine, 44(3):151-156, March 2006.
-
(2006)
IEEE, Communications Magazine
, vol.44
, Issue.3
, pp. 151-156
-
-
Sarangan, V.1
Chen, J.-C.2
-
14
-
-
72249100558
-
An integrated cache and memory access time, cycle time, area, leakage, and dynamic power model
-
Technical report, Western Research Laboratory, Palo Alto, California, June
-
S. J. Wilton and N. P. Jouppi. An integrated cache and memory access time, cycle time, area, leakage, and dynamic power model. Technical report, Western Research Laboratory, Palo Alto, California, June 1994.
-
(1994)
-
-
Wilton, S.J.1
Jouppi, N.P.2
-
15
-
-
32544459888
-
Dynamically negotiated security service for multicast application in the active network
-
2 Feb
-
Z. Y. Xia, J. Wang, and X. L. Qin. Dynamically negotiated security service for multicast application in the active network. IEE Proceedings-Communications, 153(1):31-38, 2 Feb. 2006.
-
(2006)
IEE Proceedings-Communications
, vol.153
, Issue.1
, pp. 31-38
-
-
Xia, Z.Y.1
Wang, J.2
Qin, X.L.3
|