This paper summarizes the research performed under DARPA’s Autonomic Distributed Firewalls (ADF) research project. The summary begins with a review of the motivation and objecti...
Weaknesses have recently been found in the widely used cryptographic hash functions SHA-1 and MD5. A potential alternative for these algorithms is the Whirlpool hash function, whi...
A wide range of metadata projects in Denmark over the last 4-5 years are described. A new Danish legal deposit act in 1997 facilitated cooperation in the creation of a common appl...
With the emergence of the packet-switched networks as a possible system-on-chip (SoC) communication paradigm, the design of network-on-chips (NoC) has provided a challenge to the ...
This document describes the core Legion object model. The model specifies the composition and functionality of Legion's core objects--those objects that cooperate to create, ...