Sciweavers

6137 search results - page 1147 / 1228
» Securing Collaborative Applications
Sort
View
ICCD
2007
IEEE
152views Hardware» more  ICCD 2007»
14 years 19 days ago
Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors
As application-specific instruction set processors (ASIPs) are being increasingly used in mobile embedded systems, the ubiquitous networking connections have exposed these systems...
Hai Lin, Xuan Guan, Yunsi Fei, Zhijie Jerry Shi
HOTOS
2009
IEEE
14 years 19 days ago
Operating Systems Should Provide Transactions
Operating systems can efficiently provide system transactions to user applications, in which user-level processes can execute a series of system calls atomically and in isolation ...
Donald E. Porter, Emmett Witchel
ACNS
2006
Springer
86views Cryptology» more  ACNS 2006»
14 years 16 days ago
Efficient Memory Bound Puzzles Using Pattern Databases
CPU bound client puzzles have been suggested as a defense mechanism against connection depletion attacks. However, the wide disparity in CPU speeds prevents such puzzles from being...
Sujata Doshi, Fabian Monrose, Aviel D. Rubin
ANTS
2004
Springer
103views Algorithms» more  ANTS 2004»
14 years 16 days ago
A Comparison of CEILIDH and XTR
We give a comparison of the performance of the recently proposed torus-based public key cryptosystem CEILIDH, and XTR. Underpinning both systems is the mathematics of the two dimen...
Robert Granger, Dan Page, Martijn Stam
CCGRID
2004
IEEE
14 years 15 days ago
A Java-based programming environment for hierarchical Grid: Jojo
Despite recent developments in higher-level middleware for the Grid supporting high level of ease-of-programming, hurdles for widespread adoption of Grids remain high, due to (1) ...
Hidemoto Nakada, Satoshi Matsuoka
« Prev « First page 1147 / 1228 Last » Next »