Sciweavers

30 search results - page 5 / 6
» The Practice of 'Architecting' Cloud Solutions
Sort
View
IEEEARES
2009
IEEE
14 years 2 months ago
Routing Protocol Security Using Symmetric Key Based Techniques
—In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control pla...
Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poor...
EGITALY
2006
13 years 9 months ago
Real-time Cataract Surgery Simulation for Training
Cataract is a clouding of the eye's natural lens, normally due to natural aging changes, and involving at least half of the population over 65 years. Cataract extraction is t...
Marco Agus, Enrico Gobbetti, Giovanni Pintore, Gia...
CIDR
2011
234views Algorithms» more  CIDR 2011»
12 years 11 months ago
SWissBox: An Architecture for Data Processing Appliances
Database appliances offer fully integrated hardware, storage, operating system, database, and related software in a single package. Database appliances have a relatively long hist...
Gustavo Alonso, Donald Kossmann, Timothy Roscoe
WOSP
2010
ACM
13 years 7 months ago
Automatically improve software architecture models for performance, reliability, and cost using evolutionary algorithms
Quantitative prediction of quality properties (i.e. extrafunctional properties such as performance, reliability, and cost) of software architectures during design supports a syste...
Anne Martens, Heiko Koziolek, Steffen Becker, Ralf...
DAC
2004
ACM
14 years 8 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...