Sciweavers

1801 search results - page 275 / 361
» Implementation-Oriented Secure Architectures
Sort
View
ACSAC
2000
IEEE
15 years 8 months ago
The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip
The performance of RSA hardware is primarily determined by an efficient implementation of the long integer modular arithmetic and the ability to utilize the Chinese Remainder The...
Johann Großschädl
138
Voted
ICNP
2000
IEEE
15 years 8 months ago
Dynamic Internet Overlay Deployment and Management Using the X-Bone
The X-Bone dynamically deploys and manages Internet overlays to reduce con®guration e€ort and increase network component sharing. The X-Bone discovers, con®gures, and monitors ...
Joseph D. Touch
146
Voted
AGENTS
1999
Springer
15 years 7 months ago
Planning and Resource Allocation for Hard Real-Time, Fault-Tolerant Plan Execution
We describe the interface between a real-time resource allocation system with an AI planner in order to create fault-tolerant plans that are guaranteed to execute in hard real-tim...
Ella M. Atkins, Tarek F. Abdelzaher, Kang G. Shin,...
129
Voted
AGENTS
1998
Springer
15 years 7 months ago
WebACE: A Web Agent for Document Categorization and Exploration
We propose an agent for exploring and categorizing documents on the World Wide Web based on a user pro le. The heart of the agent is an automatic categorization of a set of docume...
Eui-Hong Han, Daniel Boley, Maria L. Gini, Robert ...
106
Voted
AGENTS
1998
Springer
15 years 7 months ago
Competitive Scenarios for Heterogeneous Trading Agents
We present a framework for de ning trading scenarios based on sh market auctions. In these scenarios, agents of arbitrary complexity can participate in electronic auctions under ...
Juan A. Rodríguez-Aguilar, Francisco J. Mar...