Sciweavers

4413 search results - page 697 / 883
» Security for biometric data
Sort
View
JCM
2007
76views more  JCM 2007»
15 years 4 months ago
Scheduling Small Packets in IPSec Multi-accelerator Based Systems
—IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these ...
Antonio Vincenzo Taddeo, Alberto Ferrante, Vincenz...
ENTCS
2002
145views more  ENTCS 2002»
15 years 3 months ago
Combining Monitors for Runtime System Verification
Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, ...
Joshua Levy, Hassen Saïdi, Tomás E. Ur...
GIL
2010
15 years 2 months ago
Model-based Approach to Quantify and Regionalize Peanut Production in the Major Peanut Production Provinces in the People's Repu
: China is the largest peanut producer in the world and peanut therefore an essential economic product earning significant income for China’s farmers. Major provinces for peanut ...
Heike Knörzer, Simone Graeff-Hönninger, ...
OOPSLA
2010
Springer
15 years 2 months ago
Language virtualization for heterogeneous parallel computing
As heterogeneous parallel systems become dominant, application developers are being forced to turn to an incompatible mix of low level programming models (e.g. OpenMP, MPI, CUDA, ...
Hassan Chafi, Zach DeVito, Adriaan Moors, Tiark Ro...
OOPSLA
2010
Springer
15 years 2 months ago
Instrumentation and sampling strategies for cooperative concurrency bug isolation
Fixing concurrency bugs (or crugs) is critical in modern software systems. Static analyses to find crugs such as data races and atomicity violations scale poorly, while dynamic a...
Guoliang Jin, Aditya V. Thakur, Ben Liblit, Shan L...