Sciweavers

8441 search results - page 1526 / 1689
» New Architectures for Vision
Sort
View
JHSN
2006
95views more  JHSN 2006»
15 years 4 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
JNW
2006
142views more  JNW 2006»
15 years 4 months ago
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
Yih Huang, David Arsenault, Arun Sood
ENTCS
2007
84views more  ENTCS 2007»
15 years 4 months ago
A Rewriting Logic Framework for Soft Constraints
Soft constraints extend classical constraints to deal with non-functional requirements, overconstrained problems and preferences. Bistarelli, Montanari and Rossi have developed a ...
Martin Wirsing, Grit Denker, Carolyn L. Talcott, A...
MJ
2008
148views more  MJ 2008»
15 years 4 months ago
Drive current boosting of n-type tunnel FET with strained SiGe layer at source
Though silicon tunnel field effect transistor (TFET) has attracted attention for sub-60 mV/decade subthreshold swing and very small OFF current (IOFF), its practical application i...
Nayan Patel, A. Ramesha, Santanu Mahapatra
JUCS
2006
143views more  JUCS 2006»
15 years 4 months ago
Context-Aware QoS Provision for Mobile Ad-hoc Network -based Ambient Intelligent Environments
: Lately, wireless networks have gained acceptance for home networking. Low cost installation, flexibility and no fixed infrastructures have made it possible home environments rapi...
Felix Jesús Villanueva, David Villa, Franci...
« Prev « First page 1526 / 1689 Last » Next »