Sciweavers

8503 search results - page 69 / 1701
» Secure Software Architectures
Sort
View
AGENTS
2000
Springer
15 years 6 months ago
Towards a fault-tolerant multi-agent system architecture
Multi-agent systems are prone to failures typical of any distributed system. Agents and resources may become unavailable due to machine crashes, communication breakdowns, process ...
Sanjeev Kumar, Philip R. Cohen
168
Voted
ANCS
2008
ACM
15 years 4 months ago
Low power architecture for high speed packet classification
Today's routers need to perform packet classification at wire speed in order to provide critical services such as traffic billing, priority routing and blocking unwanted Inte...
Alan Kennedy, Xiaojun Wang, Zhen Liu, Bin Liu
ACSAC
2003
IEEE
15 years 7 months ago
How to unwittingly sign non-repudiable documents with Java applications
Digital signatures allow us to produce documents whose integrity and authenticity, as we generated them, is verifiable by anybody who has access to our public key. Furthermore, w...
Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti
93
Voted
DAC
1999
ACM
15 years 6 months ago
System-Level Hardware/Software Trade-offs
Samuel P. Harbison