Sciweavers

872 search results - page 98 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
DSN
2004
IEEE
13 years 11 months ago
A Framework for Evaluating Storage System Dependability
Designing storage systems to provide business continuity in the face of failures requires the use of various data protection techniques, such as backup, remote mirroring, point-in-...
Kimberly Keeton, Arif Merchant
FPL
2006
Springer
208views Hardware» more  FPL 2006»
13 years 11 months ago
Implementation in Fpgas of Jacobi Method to Solve the Eigenvalue and Eigenvector Problem
This work shows a modular architecture based on FPGA's to solve the eigenvalue problem according to the Jacobi method. This method is able to solve the eigenvalues and eigenv...
Ignacio Bravo, Pedro Jiménez, Manuel Mazo, ...
ESORICS
2000
Springer
13 years 11 months ago
Authentication and Confidentiality via IPSEC
The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported...
Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
ASAP
2010
IEEE
142views Hardware» more  ASAP 2010»
13 years 9 months ago
Implementing decimal floating-point arithmetic through binary: Some suggestions
We propose several algorithms and provide some related results that make it possible to implement decimal floating-point arithmetic on a processor that does not have decimal opera...
Nicolas Brisebarre, Nicolas Louvet, Érik Ma...
AIA
2007
13 years 9 months ago
Plan-based assistance in the webbrowser firefox
We present a developed function library named pbifSystem which will allow for remote control of the webbrowser Firefox. Instead of controlling the browser through general pc input...
T. A. Bertz, Peter Reiss