Sciweavers

2421 search results - page 477 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
VLDB
2002
ACM
120views Database» more  VLDB 2002»
13 years 8 months ago
Improving Data Access of J2EE Applications by Exploiting Asynchronous Messaging and Caching Services
The J2EE platform provides a variety of options for making business data persistent using DBMS technology. However, the integration with existing backend database systems has prov...
Samuel Kounev, Alejandro P. Buchmann
LICS
2010
IEEE
13 years 7 months ago
Abstracting the Differential Semantics of Rule-Based Models: Exact and Automated Model Reduction
ing the differential semantics of rule-based models: exact and automated model reduction (Invited Lecture) Vincent Danos∗§, J´erˆome Feret†, Walter Fontana‡, Russell Harme...
Vincent Danos, Jérôme Feret, Walter F...
ICIC
2009
Springer
13 years 6 months ago
An Intelligent Prediction Model for Generating LGD Trigger of IEEE 802.21 MIH
IEEE recently standardized 802.21-2008 Media Independent Handover (MIH) standard. MIH is a key milestone toward the evolution of integrated heterogeneous 4G wireless networks. MIH ...
Muhammad Yousaf, Sohail Bhatti, Maaz Rehan, Amir Q...
ARC
2009
Springer
165views Hardware» more  ARC 2009»
14 years 3 months ago
Optimizing the Control Hierarchy of an ECC Coprocessor Design on an FPGA Based SoC Platform
Abstract. Most hardware/software codesigns of Elliptic Curve Cryptography only have one central control unit, typically a 32 bit or 8 bit processor core. With the ability of integr...
Xu Guo, Patrick Schaumont
ICNP
2007
IEEE
14 years 2 months ago
Design and Implementation of Cross-Domain Cooperative Firewall
Security and privacy are two major concerns in supporting roaming users across administrative domains. In current practices, a roaming user often uses encrypted tunnels, e.g., Virt...
Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros ...