Sciweavers

630 search results - page 101 / 126
» Acceptable internet use policy
Sort
View
ASIASIM
2004
Springer
14 years 29 days ago
Design and Implementation of an SSL Component Based on CBD
Abstract. SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerabl...
Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwo...
CCS
1994
ACM
13 years 11 months ago
The Design and Implementation of Tripwire: A File System Integrity Checker
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...
Gene H. Kim, Eugene H. Spafford
WWW
2005
ACM
14 years 8 months ago
Executing incoherency bounded continuous queries at web data aggregators
Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some ...
Rajeev Gupta, Ashish Puri, Krithi Ramamritham
IICS
2010
Springer
13 years 11 months ago
An Evaluation Framework for Semantic Search in P2P Networks
: We address the problem of evaluating peer-to-peer information retrieval (P2PIR) systems with semantic overlay structure. The P2PIR community lacks a commonly accepted testbed, su...
Florian Holz, Hans Friedrich Witschel, Gregor Hein...
DAGSTUHL
2006
13 years 9 months ago
Pre-Routed FPGA Cores for Rapid System Construction in a Dynamic Reconfigurable System
This paper presents a method of constructing pre-routed FPGA cores which lays the foundations for a rapid system construction framework for dynamically reconfigurable computing sy...
Douglas L. Maskell, Timothy F. Oliver