Sciweavers

5333 search results - page 976 / 1067
» Business
Sort
View
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
15 years 10 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
HASE
2007
IEEE
15 years 10 months ago
Simulation Models and Implementation of a Simulator for the Performability Analysis of Electric Power Systems Considering Interd
Electric Power Systems (EPS) become more and more critical for our society, since they provide vital services for the human activities. At the same time, obtaining dependable beha...
Francesco Romani, Silvano Chiaradonna, Felicita Di...
ICC
2007
IEEE
161views Communications» more  ICC 2007»
15 years 10 months ago
Optimizing Multiplayer Gaming Protocols for Heterogeneous Network Environment
— The paper is concerned with a novel adaptive game server protocol optimization to combat network latencies in the case of heterogeneous network environment. In this way, game p...
Zsolt Kenesi, Gábor Kiss, János Leve...
NCA
2007
IEEE
15 years 10 months ago
Towards IQ-Appliances: Quality-awareness in Information Virtualization
Our research addresses two important problems that arise in modern large-scale distributed systems: (1) the necessity to virtualize their data flows by applying actions such as ...
Radhika Niranjan, Ada Gavrilovska, Karsten Schwan,...
BTW
2007
Springer
164views Database» more  BTW 2007»
15 years 10 months ago
Ruminations on Multi-Tenant Databases
: This is a position paper on multi-tenant databases. As motivation, it first describes the emerging marketplace of hosted enterprise services and the importance of using multi-ten...
Dean Jacobs, Stefan Aulbach