Sciweavers

8503 search results - page 1471 / 1701
» Secure Software Architectures
Sort
View
ML
2006
ACM
14 years 4 months ago
ML grid programming with ConCert
Grid computing has become increasingly popular with the growth of the Internet, especially in large-scale scientific computation. Computational Grids are characterized by their s...
Tom Murphy VII
GLVLSI
2005
IEEE
85views VLSI» more  GLVLSI 2005»
14 years 4 months ago
VLSI CAD tool protection by birthmarking design solutions
Many techniques have been proposed in the past for the protection of VLSI design IPs (intellectual property). CAD tools and algorithms are intensively used in all phases of modern...
Lin Yuan, Gang Qu, Ankur Srivastava
ICAC
2005
IEEE
14 years 4 months ago
AutoPod: Unscheduled System Updates with Zero Data Loss
Patching, upgrading, and maintaining operating system software is a growing management complexity problem that can result in unacceptable system downtime. We introduce AutoPod, a ...
Shaya Potter, Jason Nieh
LCN
2005
IEEE
14 years 4 months ago
AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN
—TCP/IP protocol suite carries most application data in Internet. TCP flow retrieval has more security meanings than the IP packet payload. Hence, monitoring the TCP flow has mor...
Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Z...
SACMAT
2005
ACM
14 years 3 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
« Prev « First page 1471 / 1701 Last » Next »