Sciweavers

3686 search results - page 669 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
ISW
2009
Springer
14 years 2 months ago
MAC Precomputation with Applications to Secure Memory
We present ShMAC (Shallow MAC), a fixed input length message authentication code that performs most of the computation prior to the availability of the message. Specifically, Sh...
Juan A. Garay, Vladimir Kolesnikov, Rae McLellan
SBACPAD
2007
IEEE
85views Hardware» more  SBACPAD 2007»
14 years 2 months ago
Exigency-based real-time scheduling policy to provide absolute QoS for web services
— Telemedicine, distance learning and e-commerce applications impose time constraints directly related to the efficacy of their operations. In order to offer reliability levels ...
Lucas S. Casagrande, Rodrigo Fernandes de Mello, R...
WORDS
2002
IEEE
14 years 21 days ago
Reconfiguration of Resources in Middleware
: The monolithic and inflexible nature of current middleware has made it difficult to deal with emerging technologies such as multimedia. Since these applications have timeliness c...
Hector A. Duran-Limon, Gordon S. Blair
SIGMOD
2010
ACM
182views Database» more  SIGMOD 2010»
14 years 19 days ago
Query portals: dynamically generating portals for entity-oriented web queries
Many web queries seek information about named entities (such as products or people). Web search engines federate such entity-oriented queries to relevant structured databases; the...
Sanjay Agrawal, Kaushik Chakrabarti, Surajit Chaud...
ICDCS
1999
IEEE
14 years 3 days ago
Design Considerations for Distributed Caching on the Internet
In this paper, we describe the design and implementation of an integrated architecture for cache systems that scale to hundreds or thousands of caches with thousands to millions o...
Renu Tewari, Michael Dahlin, Harrick M. Vin, Jonat...