Sciweavers

449 search results - page 25 / 90
» Protecting the Hosted Application Server
Sort
View
OOPSLA
2000
Springer
13 years 11 months ago
An approach to safe object sharing
It is essential for security to be able to isolate mistrusting programs from one another, and to protect the host platform from programs. Isolation is difficult in object-oriented...
Ciarán Bryce, Chrislain Razafimahefa
SUTC
2008
IEEE
14 years 2 months ago
PNECOS: A Peer-to-Peer Network Coding Streaming System
Multimedia streaming service, such as IPTV and VoD, is one of killer applications in 4G network. Exploiting well resources of end hosts to extend the service scalability of a medi...
Tein-Yaw Chung, Chih-Cheng Wang, Yung-Mu Chen, Yan...
CASES
2006
ACM
13 years 11 months ago
Cost-efficient soft error protection for embedded microprocessors
Device scaling trends dramatically increase the susceptibility of microprocessors to soft errors. Further, mounting demand for embedded microprocessors in a wide array of safety c...
Jason A. Blome, Shantanu Gupta, Shuguang Feng, Sco...
CN
2004
106views more  CN 2004»
13 years 7 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...
ARC
2011
Springer
198views Hardware» more  ARC 2011»
12 years 11 months ago
NetStage/DPR: A Self-adaptable FPGA Platform for Application-Level Network Security
Increasing transmission speeds in high-performance networks pose significant challenges to protecting the systems and networking infrastructure. Reconfigurable devices have alrea...
Sascha Mühlbach, Andreas Koch