Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
High performance microprocessors are designed with generalpurpose applications in mind. When it comes to embedded applications, these architectures typically perform controlintens...
In the initial stage of sequence analysis, a biologist is first faced with the questions about how to choose the best tool to align sequences of interest and how to analyze and v...
Arthur Chun-Chieh Shih, D. T. Lee, Laurent Lin, Ch...
The fundamental drawback of unstructured peer-to-peer (P2P) networks is the flooding-based query processing protocol that seriously limits their scalability. As a result, a signi...