Sciweavers

7924 search results - page 1489 / 1585
» Non-Malleable Functions and Their Applications
Sort
View
INFOCOM
2008
IEEE
14 years 3 months ago
Firewall Compressor: An Algorithm for Minimizing Firewall Policies
—A firewall is a security guard placed between a private network and the outside Internet that monitors all incoming and outgoing packets. The function of a firewall is to exam...
Alex X. Liu, Eric Torng, Chad R. Meiners
INFOCOM
2008
IEEE
14 years 3 months ago
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing
—Trusted Collaborative Computing (TCC) is a new research and application paradigm. Two important challenges in such a context are represented by secure information transmission a...
Xukai Zou, Yuan-Shun Dai, Elisa Bertino
IROS
2008
IEEE
250views Robotics» more  IROS 2008»
14 years 3 months ago
Mobile robot broadband sound localisation using a biologically inspired spiking neural network
— A biologically inspired azimuthal broadband sound localisation system is introduced to simulates the functional organisation of the human auditory midbrain up to the inferior c...
Jindong Liu, Harry R. Erwin, Stefan Wermter
ISPASS
2008
IEEE
14 years 3 months ago
Pinpointing and Exploiting Opportunities for Enhancing Data Reuse
—The potential for improving the performance of data-intensive scientific programs by enhancing data reuse in cache is substantial because CPUs are significantly faster than me...
Gabriel Marin, John M. Mellor-Crummey
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
14 years 3 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
« Prev « First page 1489 / 1585 Last » Next »