Sciweavers

2424 search results - page 461 / 485
» The High Level Architecture for Simulations
Sort
View
IWCMC
2009
ACM
14 years 3 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
ACSAC
2008
IEEE
14 years 3 months ago
Defending Against Attacks on Main Memory Persistence
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
William Enck, Kevin R. B. Butler, Thomas Richardso...
ISCA
2008
IEEE
130views Hardware» more  ISCA 2008»
14 years 3 months ago
Corona: System Implications of Emerging Nanophotonic Technology
We expect that many-core microprocessors will push performance per chip from the 10 gigaflop to the 10 teraflop range in the coming decade. To support this increased performance...
Dana Vantrease, Robert Schreiber, Matteo Monchiero...
ACSAC
2006
IEEE
14 years 2 months ago
A Module System for Isolating Untrusted Software Extensions
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
Philip W. L. Fong, Simon A. Orr
ICDCS
2006
IEEE
14 years 2 months ago
Interplay of ISPs: Distributed Resource Allocation and Revenue Maximization
The Internet is a hierarchical architecture comprising heterogeneous entities of privately owned infrastructures, where higher level Internet service providers (ISPs) supply conne...
Sam C. M. Lee, Joe W. J. Jiang, John C. S. Lui, Da...