Intrusion Detection Systems such as Snort scan incoming packets for evidence of security threats. The most computation-intensive part of these systems is a text search against hund...
—In order for Semantic Web applications to be successful a key component should be their ability to take advantage of rich content descriptions in meaningful ways. Reasoning cons...
Dimitrios A. Koutsomitropoulos, Georgia D. Solomou...
This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...
A major trend in the current information society is personalization, which is considered a key business enabler for mobile services because the mobile device is a personal assista...
Marc M. Lankhorst, Herma Van Kranenburg, Alfons H....
This paper presents the study and results of running several core multimedia applications on a simultaneous multithreading (SMT) architecture, including some detailed analysis ran...
Yen-Kuang Chen, Eric Debes, Rainer Lienhart, Matth...