Sciweavers

796 search results - page 65 / 160
» Spoofing prevention method
Sort
View
ISLPED
1998
ACM
86views Hardware» more  ISLPED 1998»
14 years 2 months ago
The energy complexity of register files
Register files (RF) represent a substantial portion of the energy budget in modern processors, and are growing rapidly with the trend towards wider instruction issue. The actual ...
Victor V. Zyuban, Peter M. Kogge
ICCS
2007
Springer
14 years 1 months ago
Combining Classifiers for Web Violent Content Detection and Filtering
Keeping people away from litigious information becomes one of the most important research area in network information security. Indeed, Web filtering is used to prevent access to u...
Radhouane Guermazi, Mohamed Hammami, Abdelmajid Be...
ASWEC
2004
IEEE
14 years 1 months ago
Obstacles to a Totally Functional Programming Style
"Totally Functional Programming" (TFP) advocates the complete replacement of symbolic representations for data by functions. TFP is motivated by observations from practi...
Paul A. Bailes, Colin J. M. Kemp
ESORICS
2000
Springer
14 years 1 months ago
Authentication and Confidentiality via IPSEC
The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported...
Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
VLDB
1987
ACM
72views Database» more  VLDB 1987»
14 years 1 months ago
Providing Time-Related Constraints for Conventional Database Systems
A model for a historical database is described which is based upon time-stamped tuples as the unit of storage. The model includes both physical and logical time-stamps. The techni...
T. Abbod, K. Brown, H. Noble