Sciweavers

18374 search results - page 56 / 3675
» Applications for data hiding
Sort
View
MIDDLEWARE
2004
Springer
14 years 3 months ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov
ISCA
2000
IEEE
111views Hardware» more  ISCA 2000»
14 years 2 months ago
Understanding the backward slices of performance degrading instructions
For many applications, branch mispredictions and cache misses limit a processor’s performance to a level well below its peak instruction throughput. A small fraction of static i...
Craig B. Zilles, Gurindar S. Sohi
IFIP11
2004
141views Business» more  IFIP11 2004»
13 years 11 months ago
Identity Management for Self-Portrayal
Identity management systems help users to organise their digital profiles in order to communicate parts of them, whenever needed and wanted, to communication partners like internet...
Tobias Baier, Christian P. Kunze
COMSUR
2007
101views more  COMSUR 2007»
13 years 9 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
CONCURRENCY
2007
109views more  CONCURRENCY 2007»
13 years 9 months ago
The Open Grid Computing Environments collaboration: portlets and services for science gateways
: We review the efforts of the Open Grid Computing Environments collaboration. By adopting a general three-tiered architecture based on common standards for portlets and Grid Web S...
Jay Alameda, Marcus Christie, Geoffrey Fox, Joe Fu...