Sciweavers

1610 search results - page 306 / 322
» Identity Based Multisignatures
Sort
View
ISORC
2005
IEEE
14 years 2 months ago
Building Responsive TMR-Based Servers in Presence of Timing Constraints
This paper is on the construction of a fault-tolerant and responsive server subsystem in an application context where the subsystem is accessed through an asynchronous network by ...
Paul D. Ezhilchelvan, Jean-Michel Hélary, M...
SACMAT
2005
ACM
14 years 2 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
SIGMETRICS
2005
ACM
150views Hardware» more  SIGMETRICS 2005»
14 years 2 months ago
An analytical model for multi-tier internet services and its applications
- Since many Web applications employ a multi-tier architecture, in this paper, we focus on the problem of analytically modeling the behavior of such applications. We present a mode...
Bhuvan Urgaonkar, Giovanni Pacifici, Prashant J. S...
FPGA
2005
ACM
97views FPGA» more  FPGA 2005»
14 years 2 months ago
Techniques for synthesizing binaries to an advanced register/memory structure
Recent works demonstrate several benefits of synthesizing software binaries onto FPGA hardware, including incorporating hardware design into established software tool flows with m...
Greg Stitt, Zhi Guo, Walid A. Najjar, Frank Vahid
PREMI
2005
Springer
14 years 1 months ago
Pattern Recognition in Video
Images constitute data that lives in a very high dimensional space, typically of the order of hundred thousand dimensions. Drawing inferences from data of such high dimensions soon...
Rama Chellappa, Ashok Veeraraghavan, Gaurav Aggarw...