Sciweavers

233 search results - page 42 / 47
» Implementing Signatures for Transactional Memory
Sort
View
IPPS
2008
IEEE
14 years 3 months ago
A deterministic multi-way rendezvous library for haskell
The advent of multicore processors requires mainstream concurrent programming languages with high level concurrency constructs and effective debugging techniques. Unfortunately, m...
Nalini Vasudevan, Satnam Singh, Stephen A. Edwards
PAM
2010
Springer
14 years 3 months ago
Network DVR: A Programmable Framework for Application-Aware Trace Collection
Network traces are essential for a wide range of network applications, including traffic analysis, network measurement, performance monitoring, and security analysis. Existing cap...
Chia-Wei Chang, Alexandre Gerber, Bill Lin, Subhab...
ARC
2006
Springer
122views Hardware» more  ARC 2006»
14 years 9 days ago
UNITE: Uniform Hardware-Based Network Intrusion deTection Engine
Abstract. Current software implementations of network intrusion detection reach a maximum network connection speed of about 1Gbps (Gigabits per second). This paper analyses the Sno...
Sherif Yusuf, Wayne Luk, M. K. N. Szeto, William G...
ANCS
2005
ACM
14 years 2 months ago
Fast and scalable pattern matching for content filtering
High-speed packet content inspection and filtering devices rely on a fast multi-pattern matching algorithm which is used to detect predefined keywords or signatures in the packe...
Sarang Dharmapurikar, John W. Lockwood
CCS
2009
ACM
14 years 3 months ago
Anonymous credentials on a standard java card
Secure identity tokens such as Electronic Identity (eID) cards are emerging everywhere. At the same time usercentric identity management gains acceptance. Anonymous credential sch...
Patrik Bichsel, Jan Camenisch, Thomas Groß, ...