Sciweavers

653 search results - page 94 / 131
» Addressing interoperability issues in access control models
Sort
View
JSW
2007
116views more  JSW 2007»
13 years 8 months ago
Security Patterns for Voice over IP Networks
—Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditi...
Eduardo B. Fernández, Juan C. Pelaez, Mar&i...
ICCAD
1997
IEEE
101views Hardware» more  ICCAD 1997»
14 years 11 days ago
Minimum area retiming with equivalent initial states
Traditional minimum area retiming algorithms attempt to achieve their prescribed objective with no regard to maintaining the initial state of the system. This issue is important f...
Naresh Maheshwari, Sachin S. Sapatnekar
GRAPHICSINTERFACE
2003
13 years 9 months ago
Distortion minimization and continuity preservation in surface pasting
Surface pasting is a hierarchical modeling technique capable of adding local details to tensor product Bspline surfaces without incurring significant computational costs. In this...
Rick Leung, Stephen Mann
CLUSTER
2008
IEEE
14 years 2 months ago
High message rate, NIC-based atomics: Design and performance considerations
—Remote atomic memory operations are critical for achieving high-performance synchronization in tightly-coupled systems. Previous approaches to implementing atomic memory operati...
Keith D. Underwood, Michael Levenhagen, K. Scott H...
CCS
2000
ACM
14 years 15 days ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....