Sciweavers

1522 search results - page 236 / 305
» Design and Implementation of a Policy-based Resource Managem...
Sort
View
SAC
2000
ACM
15 years 9 months ago
Supporting Compositional Reuse in Component-Based Web Engineering
: The World Wide Web’s anticipated scope as an environment for knowledge exchange has changed dramatically. Without major modifications to its primary mechanisms the Web has turn...
Martin Gaedke, Jörn Rehse
ARC
2006
Springer
122views Hardware» more  ARC 2006»
15 years 8 months ago
UNITE: Uniform Hardware-Based Network Intrusion deTection Engine
Abstract. Current software implementations of network intrusion detection reach a maximum network connection speed of about 1Gbps (Gigabits per second). This paper analyses the Sno...
Sherif Yusuf, Wayne Luk, M. K. N. Szeto, William G...
FPL
2006
Springer
120views Hardware» more  FPL 2006»
15 years 8 months ago
Regular Expression Software Deceleration for Intrusion Detection Systems
The use of reconfigurable hardware for network security applications has recently made great strides as FPGA devices have provided larger and faster resources. Regular expressions...
Zachary K. Baker, Viktor K. Prasanna, Hong-Jip Jun...
BSDCON
2003
15 years 6 months ago
ULE: A Modern Scheduler for FreeBSD
The existing thread scheduler in FreeBSD was well suited towards the computing environment that it was developed in. As the priorities and hardware targets of the project have cha...
Jeff Roberson
131
Voted
ACSAC
2005
IEEE
15 years 10 months ago
A Nitpicker's guide to a minimal-complexity secure GUI
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Norman Feske, Christian Helmuth