Sciweavers

6223 search results - page 1077 / 1245
» New architectures for a new biology
Sort
View
JSW
2008
127views more  JSW 2008»
13 years 10 months ago
A Trust Based System for Enhanced Spam Filtering
The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to filtering techniques and the lack of incentive for mail servers to filter outgoing ...
Jimmy McGibney, Dmitri Botvich
JSW
2008
93views more  JSW 2008»
13 years 10 months ago
Is SOA Superior? Evidence from SaaS Financial Statements
We use audited financial statements to examine claims that service-oriented architecture (SOA) leads to higher profits relative to traditional software delivery models. Specificall...
Thomas W. Hall
JEC
2006
71views more  JEC 2006»
13 years 10 months ago
Destructive-read in embedded DRAM, impact on power consumption
This paper explores power consumption for destructive-read embedded DRAM. Destructive-read DRAM is based on conventional DRAM design, but with sense amplifiers optimized for lower ...
Haakon Dybdahl, Per Gunnar Kjeldsberg, Marius Gran...
JHSN
2006
95views more  JHSN 2006»
13 years 10 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
JNW
2006
142views more  JNW 2006»
13 years 10 months ago
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
Yih Huang, David Arsenault, Arun Sood
« Prev « First page 1077 / 1245 Last » Next »