Sciweavers

3899 search results - page 681 / 780
» Argumentation for Access Control
Sort
View
ACSAC
2008
IEEE
14 years 4 months ago
Defending Against Attacks on Main Memory Persistence
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
William Enck, Kevin R. B. Butler, Thomas Richardso...
IPPS
2008
IEEE
14 years 4 months ago
A Hybrid MPI design using SCTP and iWARP
Abstract— Remote Direct Memory Access (RDMA) and pointto-point network fabrics both have their own advantages. MPI middleware implementations typically use one or the other, howe...
Mike Tsai, Brad Penoff, Alan Wagner
ICC
2007
IEEE
164views Communications» more  ICC 2007»
14 years 4 months ago
An Application-Driven Mobility Management Scheme for Hierarchical Mobile IPv6 Networks
— Mobile users are expected to be highly dynamic in next generation mobile networks. Additionally they will be served a wide variety of services with different transmission rates...
Tarik Taleb, Yuji Ikeda, Kazuo Hashimoto, Yoshiaki...
ICC
2007
IEEE
100views Communications» more  ICC 2007»
14 years 4 months ago
S.T.R.E.S.S. : Stress Testing and Reverse Engineering for System Security
— In modern wireless networks the functions included into layer II have to deal with complex problems, such as security and access control, that were previously demanded to upper...
Matteo Rosi, Leonardo Maccari, Romano Fantacci
IROS
2007
IEEE
132views Robotics» more  IROS 2007»
14 years 4 months ago
In-vivo pan/tilt endoscope with integrated light source
— Endoscopic imaging is still dominated by the paradigm of pushing long sticks into small openings. This approach has a number of limitations for minimal access surgery, such as ...
Tie Hu, Peter K. Allen, Dennis L. Fowler