Sciweavers

187 search results - page 26 / 38
» Stream Processing in Production-to-Business Software
Sort
View
DIMVA
2011
12 years 11 months ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
MM
2000
ACM
94views Multimedia» more  MM 2000»
13 years 12 months ago
A digital television navigator
Digital television is a new, interesting, and rich platform for developing next generation multimedia services. Navigator is the most important Multimedia service of digital telev...
Chengyuan Peng, Petri Vuorimaa
HICSS
1997
IEEE
90views Biometrics» more  HICSS 1997»
13 years 11 months ago
A Workload Generation Environment for Trace-Driven Simulation of Shared-Bus Multiprocessors
We describe an environment to produce traces representing significant workloads for a shared-bus shared-memory multiprocessor used as a general-purpose multitasking machine, wher...
Roberto Giorgi, Cosimo Antonio Prete, Gianpaolo Pr...
EMSOFT
2004
Springer
14 years 28 days ago
Towards a higher-order synchronous data-flow language
The paper introduces a higher-order synchronous data-flow language in which communication channels may themselves transport programs. This provides a mean to dynamically reconfi...
Jean-Louis Colaço, Alain Girault, Gré...
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
13 years 11 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui