Sciweavers

3733 search results - page 231 / 747
» Performance Evaluation of an Operating System Transaction Ma...
Sort
View
HICSS
2006
IEEE
131views Biometrics» more  HICSS 2006»
15 years 10 months ago
Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms
— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...
149
Voted
PDPTA
2000
15 years 6 months ago
Design, Implementation, and Experimentation on Mobile Agent Security for Electronic Commerce Applications
In this paper, a Shopping Information Agent System (SIAS) is built based on mobile agent technology. It sends out agents to di erent hosts in an electronic marketplace. The agents ...
Anthony H. W. Chan, Caris K. M. Wong, Tsz Yeung Wo...
137
Voted
WWW
2009
ACM
16 years 5 months ago
OpenRuleBench: an analysis of the performance of rule engines
The Semantic Web initiative has led to an upsurge of the interest in rules as a general and powerful way of processing, combining, and analyzing semantic information. Since severa...
Senlin Liang, Paul Fodor, Hui Wan, Michael Kifer
IWCMC
2010
ACM
15 years 6 months ago
A flow trace generator using graph-based traffic classification techniques
We propose a novel methodology to generate realistic network flow traces to enable systematic evaluation of network monitoring systems in various traffic conditions. Our technique...
Peter Siska, Marc Ph. Stoecklin, Andreas Kind, Tor...
127
Voted
NCA
2006
IEEE
15 years 10 months ago
A Primary-Backup Protocol for In-Memory Database Replication
The paper presents a primary-backup protocol to manage replicated in-memory database systems (IMDBs). The protocol exploits two features of IMDBs: coarse-grain concurrency control...
Lásaro J. Camargos, Fernando Pedone, Rodrig...