Sciweavers

2912 search results - page 519 / 583
» Architecture for Providing Services in the Ubiquitous Comput...
Sort
View
IDTRUST
2009
ACM
14 years 4 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
ISCAPDCS
2007
13 years 10 months ago
An autonomic element design for a distributed object system
Current research in autonomic computing suffers from the lack of a common definition of the basic autonomic entities. Defining and developing the basic autonomic entities and maki...
M. Muztaba Fuad, Debzani Deb, Michael J. Oudshoorn
ERCIM
2007
124views more  ERCIM 2007»
13 years 9 months ago
Cancer Treatment Planning with Grid-Based Technology
sented by abstract mathematical structures, and visualization is used to convert these into pictures. At the core of every simulation is a mathematical model that is evaluated by a...
Robert G. Belleman, Michael Scarpa, Bram Stolk
SIGCOMM
2006
ACM
14 years 3 months ago
Algorithms to accelerate multiple regular expressions matching for deep packet inspection
There is a growing demand for network devices capable of examining the content of data packets in order to improve network security and provide application-specific services. Most...
Sailesh Kumar, Sarang Dharmapurikar, Fang Yu, Patr...
IPPS
2010
IEEE
13 years 7 months ago
Oversubscription on multicore processors
Abstract: Existing multicore systems already provide deep levels of thread parallelism. Hybrid programming models and composability of parallel libraries are very active areas of r...
Costin Iancu, Steven Hofmeyr, Filip Blagojevic, Yi...