Sciweavers

1399 search results - page 266 / 280
» Designing High-Performance Distributed Applications Using So...
Sort
View
ICS
2003
Tsinghua U.
14 years 24 days ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
WWW
2007
ACM
14 years 8 months ago
OntoWiki: A Tool for Social, Semantic Collaboration
Abstract We present OntoWiki, a tool providing support for agile, distributed knowledge engineering scenarios. OntoWiki facilitates the visual presentation of a knowledge base as a...
Jens Lehmann, Sören Auer, Sebastian Dietzold,...
ISCA
2010
IEEE
284views Hardware» more  ISCA 2010»
14 years 21 days ago
Security refresh: prevent malicious wear-out and increase durability for phase-change memory with dynamically randomized address
Phase change memory (PCM) is an emerging memory technology for future computing systems. Compared to other non-volatile memory alternatives, PCM is more matured to production, and...
Nak Hee Seong, Dong Hyuk Woo, Hsien-Hsin S. Lee
JCDL
2004
ACM
198views Education» more  JCDL 2004»
14 years 1 months ago
Finding authoritative people from the web
Today’s web is so huge and diverse that it arguably reflects the real world. For this reason, searching the web is a promising approach to find things in the real world. This ...
Masanori Harada, Shin-ya Sato, Kazuhiro Kazama
SIGCOMM
2009
ACM
14 years 2 months ago
A programmable overlay router for service provider innovation
The threat of commoditization poses a real challenge for service providers. While the end-to-end principle is often paraphrased as “dumb network, smart end-systems”, the origi...
Bruce S. Davie, Jan Medved