Sciweavers

9272 search results - page 1698 / 1855
» Process Management Agent
Sort
View
131
Voted
TRIDENTCOM
2010
IEEE
15 years 14 days ago
A Testbed for Validation and Assessment of Frame Switching Networks
Packet assembly at the network edge is one solution to reduce high packet rates in core network switches. Literature discusses this topic controversially because of three reasons: ...
Arthur Mutter, Sebastian Gunreben, Wolfram Lautens...
114
Voted
WIKIS
2010
ACM
15 years 13 days ago
Toward sensitive information redaction in a collaborative, multilevel security environment
Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, gove...
Peter Gehres, Nathan Singleton, George Louthan, Jo...
146
Voted
ACSAC
2009
IEEE
15 years 13 days ago
RoleVAT: Visual Assessment of Practical Need for Role Based Access Control
Abstract--Role based access control (RBAC) is a powerful security administration concept that can simplify permission assignment management. Migration to and maintenance of RBAC re...
Dana Zhang, Kotagiri Ramamohanarao, Steven Verstee...
DAC
2009
ACM
15 years 12 days ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
140
Voted
DATESO
2009
158views Database» more  DATESO 2009»
15 years 12 days ago
Benchmarking Coding Algorithms for the R-tree Compression
Multi-dimensional data structures have been widely applied in many data management fields. Spatial data indexing is their natural application, however there are many applications i...
Jirí Walder, Michal Krátký, R...
« Prev « First page 1698 / 1855 Last » Next »