Sciweavers

7329 search results - page 1310 / 1466
» Software Architectural Transformation
Sort
View
ISVLSI
2006
IEEE
114views VLSI» more  ISVLSI 2006»
15 years 10 months ago
A Low Power Lookup Technique for Multi-Hashing Network Applications
Many network security applications require large virus signature sets to be maintained, retrieved, and compared against the network streams. Software applications frequently fail ...
Ilhan Kaya, Taskin Koçak
LAWEB
2006
IEEE
15 years 10 months ago
Modeling and Composing Navigational Concerns in Web Applications. Requirements and Design Issues
Complex applications, in particular Web applications, deal with a myriad of different concerns and some of them affect several others. The result is that these crosscutting concer...
Silvia E. Gordillo, Gustavo Rossi, Ana Moreira, Jo...
124
Voted
SBACPAD
2006
IEEE
102views Hardware» more  SBACPAD 2006»
15 years 10 months ago
Ultra-Fast CPU Performance Prediction: Extending the Monte Carlo Approach
Performance evaluation of contemporary processors is becoming increasingly difficult due to the lack of proper frameworks. Traditionally, cycle-accurate simulators have been exte...
Ram Srinivasan, Jeanine Cook, Olaf M. Lubeck
SRDS
2006
IEEE
15 years 10 months ago
WRAPS: Denial-of-Service Defense through Web Referrals
The web is a complicated graph, with millions of websites interlinked together. In this paper, we propose to use this web sitegraph structure to mitigate flooding attacks on a we...
XiaoFeng Wang, Michael K. Reiter
153
Voted
ANCS
2006
ACM
15 years 10 months ago
Design of a web switch in a reconfigurable platform
The increase of the web traffic has created the need for web switches that are able to balance the traffic to the server farms based on their contents (e.g. layer 7 switching). In...
Christoforos Kachris, Stamatis Vassiliadis
« Prev « First page 1310 / 1466 Last » Next »