Sciweavers

1801 search results - page 232 / 361
» Implementation-Oriented Secure Architectures
Sort
View
126
Voted
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
15 years 10 months ago
Minimal TCB Code Execution
TCB Code Execution (Extended Abstract)∗ Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, and Arvind Seshadri Carnegie Mellon University We propose an architect...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
132
Voted
ISCAS
2006
IEEE
163views Hardware» more  ISCAS 2006»
15 years 10 months ago
ASIC hardware implementation of the IDEA NXT encryption algorithm
— Symmetric-key block ciphers are often used to provide data confidentiality with low complexity, especially in the case of dedicated hardware implementations. IDEA NXT is a nov...
Marco Macchetti, Wenyu Chen
132
Voted
ANTSW
2004
Springer
15 years 9 months ago
Hypothesis Corroboration in Semantic Spaces with Swarming Agents
To anticipate and prevent acts of terrorism, Indications and Warnings analysts try to connect clues gleaned from massive quantities of complex data. Multi-agent approaches to suppo...
Peter Weinstein, H. Van Dyke Parunak, Paul Chiusan...
CCGRID
2002
IEEE
15 years 8 months ago
Symphony - A Java-Based Composition and Manipulation Framework for Computational Grids
We introduce the Symphony framework, a software ion layer that can sit on top of grid systems. Symphony provides a unified API for grid application developers and offers a graphic...
Markus Lorch, Dennis G. Kafura
HPDC
2002
IEEE
15 years 8 months ago
Lightweight Self-Organizing Frameworks for Metacomputing
A novel component-based, service-oriented framework for distributed metacomputing is described. Adopting a provider-centric view of resource sharing, this project emphasizes light...
Vaidy S. Sunderam, Dawid Kurzyniec