Sciweavers

1196 search results - page 179 / 240
» High Availability and Scalability Support for Web Applicatio...
Sort
View
IEEEIAS
2008
IEEE
14 years 3 months ago
Operator-Centric and Adaptive Intrusion Detection
: An intrusion detection system should support the operator of the system. Thus, in addition to producing alerts, it should allow for easy insertion of new detection algorithms. It...
Ulf Larson, Stefan Lindskog, Dennis K. Nilsson, Er...
FC
1997
Springer
86views Cryptology» more  FC 1997»
14 years 1 months ago
The SPEED Cipher
Abstract. SPEED is a private key block cipher. It supports three variable parameters: (1) data length — the length of a plaintext/ciphertext of SPEED can be 64, 128 or 256 bits. ...
Yuliang Zheng
BMCBI
2005
131views more  BMCBI 2005»
13 years 9 months ago
Critical evaluation of the JDO API for the persistence and portability requirements of complex biological databases
Background: Complex biological database systems have become key computational tools used daily by scientists and researchers. Many of these systems must be capable of executing on...
Marko Srdanovic, Ulf Schenk, Michael Schwieger, Fa...
BTW
2007
Springer
164views Database» more  BTW 2007»
14 years 3 months ago
Ruminations on Multi-Tenant Databases
: This is a position paper on multi-tenant databases. As motivation, it first describes the emerging marketplace of hosted enterprise services and the importance of using multi-ten...
Dean Jacobs, Stefan Aulbach
INFOCOM
2005
IEEE
14 years 2 months ago
TCAM-based distributed parallel packet classification algorithm with range-matching solution
Packet Classification (PC) has been a critical data path function for many emerging networking applications. An interesting approach is the use of TCAM to achieve deterministic, hi...
Kai Zheng, Hao Che, Zhijun Wang, Bin Liu