Sciweavers

1264 search results - page 159 / 253
» Designing Safe, Reliable Systems using Scade
Sort
View
SIGCOMM
2003
ACM
15 years 9 months ago
A measurement-based analysis of multihoming
Multihoming has traditionally been employed by stub networks to enhance the reliability of their network connectivity. With the advent of commercial “intelligent route controlâ€...
Aditya Akella, Bruce M. Maggs, Srinivasan Seshan, ...
FPGA
2007
ACM
122views FPGA» more  FPGA 2007»
15 years 10 months ago
The shunt: an FPGA-based accelerator for network intrusion prevention
Today’s network intrusion prevention systems (IPSs) must perform increasingly sophisticated analysis—parsing protocols and interpreting application dialogs rather than simply ...
Nicholas Weaver, Vern Paxson, José M. Gonz&...
PLDI
2006
ACM
15 years 10 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difï¬cult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
ICIW
2007
IEEE
15 years 10 months ago
QoS Composition of Services for Data-Intensive Application
— Service-Oriented Computing (SOC) is a promising means to integrate heterogeneous systems. Services from different providers can be integrated into a composite service regardles...
Antonio Bucchiarone, Luigi Presti
GLOBECOM
2007
IEEE
15 years 10 months ago
UWB Impulse Radio with Triple-Polarization SIMO
Abstract— Polarized single-input multiple-output (SIMO) arrays can improve system robustness and rate while offering a compact design. We investigate the error performance of Imp...
Wasim Q. Malik, David J. Edwards