Sciweavers

2234 search results - page 320 / 447
» Protocol Implementation Using Integrated Layer Processing
Sort
View
ACSAC
2005
IEEE
15 years 10 months ago
Exploiting Independent State For Network Intrusion Detection
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
Robin Sommer, Vern Paxson
SAC
2003
ACM
15 years 10 months ago
Eliciting Coordination Policies from Requirements
Software coordination models and languages describe how agents, resources and processes work together to implement a software system. One of their limitations is that they are use...
Henry Muccini, Fabio Mancinelli
SEC
2004
15 years 6 months ago
Interactive Access Control for Web Services
Business Processes for Web Services (BPEL4WS) are the new paradigms for lightweight enterprise integration. They cross organizational boundaries and are provided by entities that s...
Hristo Koshutanski, Fabio Massacci
BMCBI
2011
14 years 8 months ago
Acorn: A grid computing system for constraint based modeling and visualization of the genome scale metabolic reaction networks v
Background: Constraint-based approaches facilitate the prediction of cellular metabolic capabilities, based, in turn on predictions of the repertoire of enzymes encoded in the gen...
Jacek Sroka, Lukasz Bieniasz-Krzywiec, Szymon Gwoz...
126
Voted
ISCAS
2002
IEEE
91views Hardware» more  ISCAS 2002»
15 years 9 months ago
Charge-based MOS correlated double sampling comparator and folding circuit
A novel charge-based comparator and folding circuit are presented. Correlated double sampling comparison is performed using a log-domain integrator, implemented by a subthreshold ...
Roman Genov, Gert Cauwenberghs