Sciweavers

6106 search results - page 1057 / 1222
» Modes for Software Architectures
Sort
View
125
Voted
WISEC
2010
ACM
15 years 10 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
CC
2010
Springer
117views System Software» more  CC 2010»
15 years 10 months ago
Punctual Coalescing
Compilers use register coalescing to avoid generating code for copy instructions. For architectures with register aliasing such as x86, Smith, Ramsey, and Holloway (2004) presented...
Fernando Magno Quintão Pereira, Jens Palsbe...
107
Voted
HICSS
2009
IEEE
155views Biometrics» more  HICSS 2009»
15 years 10 months ago
Collaborative Recommender Systems for Building Automation
Building Automation Systems (BASs) can save building owners money by reducing energy consumption while simultaneously preserving occupant comfort. There are algorithms that optimi...
Michael LeMay, Jason J. Haas, Carl A. Gunter
EUROSEC
2009
ACM
15 years 10 months ago
WISDOM: security-aware fibres
The network is becoming faster day by day. High-speed links, of many Gbps, are considered as commodity technology empowering the Internet. On the other hand, Moore’s law still a...
Elias Athanasopoulos, Antonis Krithinakis, Georgio...
124
Voted
ICS
2009
Tsinghua U.
15 years 10 months ago
Towards 100 gbit/s ethernet: multicore-based parallel communication protocol design
Ethernet line rates are projected to reach 100 Gbits/s by as soon as 2010. While in principle suitable for high performance clustered and parallel applications, Ethernet requires ...
Stavros Passas, Kostas Magoutis, Angelos Bilas
« Prev « First page 1057 / 1222 Last » Next »