Sciweavers

8503 search results - page 1521 / 1701
» Secure Software Architectures
Sort
View
SIGCOMM
2012
ACM
12 years 18 days ago
Abstractions for network update
ions for Network Update Mark Reitblatt Cornell Nate Foster Cornell Jennifer Rexford Princeton Cole Schlesinger Princeton David Walker Princeton Configuration changes are a common...
Mark Reitblatt, Nate Foster, Jennifer Rexford, Col...
ICC
2007
IEEE
186views Communications» more  ICC 2007»
14 years 4 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
CVPR
1998
IEEE
15 years 5 days ago
Real-Time 2-D Feature Detection on a Reconfigurable Computer
We have designed and implemented a system for real-time detection of 2-D features on a reconfigurable computer based on Field Programmable Gate Arrays (FPGA `s). We envision this ...
Arrigo Benedetti, Pietro Perona
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
14 years 12 months ago
Towards Composition as a Service - A Quality of Service Driven Approach
Software as a Service (SaaS) and the possibility to compose Web services provisioned over the Internet are important assets for a service-oriented architecture (SOA). However, the ...
Florian Rosenberg, Philipp Leitner, Anton Michlmay...
ICDE
2002
IEEE
161views Database» more  ICDE 2002»
14 years 11 months ago
Design and Implementation of a High-Performance Distributed Web Crawler
Broad web search engines as well as many more specialized search tools rely on web crawlers to acquire large collections of pages for indexing and analysis. Such a web crawler may...
Vladislav Shkapenyuk, Torsten Suel
« Prev « First page 1521 / 1701 Last » Next »