Sciweavers

690 search results - page 108 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
140
Voted
CSREASAM
2006
15 years 5 months ago
Session Based Logging (SBL) for IP-Traceback on Network Forensics
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, ...
Omer Demir, Ping Ji, Jinwoo Kim
ICWE
2005
Springer
15 years 9 months ago
Discovering Re-usable Design Solutions in Web Conceptual Schemas: Metrics and Methodology
Abstract. In the Internet era, the development of Web applications has impressively evolved and is characterized by a large degree of complexity. To this end, software community ha...
Yannis Panagis, Evangelos Sakkopoulos, Spiros Sirm...
134
Voted
ISCA
2005
IEEE
141views Hardware» more  ISCA 2005»
15 years 9 months ago
RegionScout: Exploiting Coarse Grain Sharing in Snoop-Based Coherence
It has been shown that many requests miss in all remote nodes in shared memory multiprocessors. We are motivated by the observation that this behavior extends to much coarser grai...
Andreas Moshovos
ICESS
2007
Springer
15 years 10 months ago
Handling Control Data Flow Graphs for a Tightly Coupled Reconfigurable Accelerator
In an embedded system including a base processor integrated with a tightly coupled accelerator, extracting frequently executed portions of the code (hot portion) and executing thei...
Hamid Noori, Farhad Mehdipour, Morteza Saheb Zaman...
150
Voted
ICSOC
2004
Springer
15 years 9 months ago
Knowledge-driven interactions with services across ad hoc networks
Service oriented computing, with its aim of unhindered interoperability, is an appropriate paradigm for ad hoc networks, which are characterized by physical mobility of heterogeno...
Rohan Sen, Radu Handorean, Gruia-Catalin Roman, Gr...