Currently, companies are about to optimize their internal processes by monitoring items they handle with Radio Frequency Identification (RFID). However, there is a risk that sens...
In this paper we present the internal representation and optimizations used by the CASH compiler for improving the memory parallelism of pointer-based programs. CASH uses an SSA-b...
This paper describes a hardware-software co-design approach for flexible programmable Galois Field Processing for applications which require operations over GF(2m ), such as RS an...
We describe "NetBouncer", an approach and set of technologies for providing practical and highperformance defenses against distributed denial-ofservice (DDoS) attacks. T...
Roshan K. Thomas, Brian L. Mark, Tommy Johnson, Ja...
This paper builds on ideas in a recent paper which argued that the core subject matter of the IS field should not be “the IT artifact” (as suggested by Orlikowski and Iacono [...