Sciweavers

5446 search results - page 1018 / 1090
» Software Architecture - Introduction
Sort
View
126
Voted
ACSAC
2007
IEEE
15 years 9 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
132
Voted
ICEBE
2007
IEEE
174views Business» more  ICEBE 2007»
15 years 9 months ago
Worksheet-Driven UMM Modeling of B2B Services
In the development process of a B2B system it is crucial that the business experts are able to express and evaluate agreements and commitments between the partners and that the so...
Christian Huemer, Marco Zapletal, Philipp Liegl, R...
120
Voted
IPPS
2007
IEEE
15 years 8 months ago
Distributed IDS using Reconfigurable Hardware
With the rapid growth of computer networks and network infrastructures and increased dependency on the internet to carry out day-to-day activities, it is imperative that the compo...
Ashok Kumar Tummala, Parimal Patel
112
Voted
NOCS
2007
IEEE
15 years 8 months ago
On Characterizing Performance of the Cell Broadband Engine Element Interconnect Bus
Abstract – With the rise of multicore computing, the design of onchip networks (or networks on chip) has become an increasingly important component of computer architecture. The ...
Thomas William Ainsworth, Timothy Mark Pinkston
MMM
2007
Springer
212views Multimedia» more  MMM 2007»
15 years 8 months ago
MetaXa - Context- and Content-Driven Metadata Enhancement for Personal Photo Books
Making a photo book as a special gift to your beloved can be very time-consuming. One has to carefully select and arrange the pictures nicely over the pages of a previously bought ...
Susanne Boll, Philipp Sandhaus, Ansgar Scherp, Sab...
« Prev « First page 1018 / 1090 Last » Next »