Sciweavers

8697 search results - page 1683 / 1740
» An Approach to the Enterprise Integration
Sort
View
ACNS
2004
Springer
85views Cryptology» more  ACNS 2004»
13 years 11 months ago
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
One of the few quantitative metrics used to evaluate the security of a cryptographic file system is the key length of the encryption algorithm; larger key lengths correspond to hig...
Michael E. Locasto, Angelos D. Keromytis
CBMS
2004
IEEE
13 years 11 months ago
Real-Time Matching of Angiographies with In Situ Heart Image Sequences
Coronary angiography has become an important tool in modern medicine by providing an additional modality for heart disease diagnostics. Even though the recorded images (or image s...
Istvan Nagy, Alois Knoll, Robert Bauernschmitt, Ev...
CLUSTER
2004
IEEE
13 years 11 months ago
Cluster computing environment supporting single system image
Single system image(SSI) systems have been the mainstay of high-performance computing for many years. SSI requires the integration and aggregation of all types of resources in a c...
Min Choi, DaeWoo Lee, Seung Ryoul Maeng
CODES
2004
IEEE
13 years 11 months ago
Fast exploration of bus-based on-chip communication architectures
As a result of improvements in process technology, more and more components are being integrated into a single System-on-Chip (SoC) design. Communication between these components ...
Sudeep Pasricha, Nikil D. Dutt, Mohamed Ben-Romdha...
COOPIS
2004
IEEE
13 years 11 months ago
Composing Mappings Between Schemas Using a Reference Ontology
Large-scale database integration requires a significant cost in developing a global schema and finding mappings between the global and local schemas. Developing the global schema r...
Eduard C. Dragut, Ramon Lawrence
« Prev « First page 1683 / 1740 Last » Next »