Sciweavers

6271 search results - page 17 / 1255
» The RACE network architecture
Sort
View
CCS
2008
ACM
13 years 9 months ago
Enforcing authorization policies using transactional memory introspection
Correct enforcement of authorization policies is a difficult task, especially for multi-threaded software. Even in carefully-reviewed code, unauthorized access may be possible in ...
Arnar Birgisson, Mohan Dhawan, Úlfar Erling...
CSREASAM
2006
13 years 9 months ago
Architectural Framework Design for Authentication Mechanism in Mobile Adhoc Networks (MANETs)
Wireless ad-hoc networks do not rely on a pre-existing network structure and are characterized by dynamic changes in the topology. This characteristic makes it difficult to perform...
Rajasekhar Yakkali, Gregory Vert
COMPCON
1996
IEEE
13 years 11 months ago
64-bit and Multimedia Extensions in the PA-RISC 2.0 Architecture
This paper describes the architectural extensions to the
Ruby B. Lee, Jerome C. Huck
IWAN
2000
Springer
13 years 11 months ago
Two Rule-Based Building-Block Architectures for Policy-Based Network Control
Policy-based networks can be customized by users by injecting programs called policies into the network nodes. So if general-purpose functions can be specified in a policy-based ne...
Yasusi Kanada
JVA
2006
IEEE
14 years 1 months ago
Features of Future Network Processor Architectures
As network applications are becoming increasingly sophisticated and internet traffic is getting heavier, future network processors must continue processing computation-intensive ...
Kyueun Yi, Jean-Luc Gaudiot