Sciweavers

582 search results - page 63 / 117
» Too Much Middleware
Sort
View
PEWASUN
2006
ACM
14 years 2 months ago
Wave propagation using the photon path map
In wireless network planning, much effort is spent on the improvement of the network and transport layer – especially for Mobile Ad Hoc Networks. Although in principle realworl...
Arne Schmitz, Leif Kobbelt
SIGIR
2006
ACM
14 years 2 months ago
Bias and the limits of pooling
Modern retrieval test collections are built through a process called pooling in which only a sample of the entire document set is judged for each topic. The idea behind pooling is...
Chris Buckley, Darrin Dimmick, Ian Soboroff, Ellen...
CODES
2005
IEEE
14 years 1 months ago
Satisfying real-time constraints with custom instructions
Instruction-set extensible processors allow an existing processor core to be extended with application-specific custom instructions. In this paper, we explore a novel application...
Pan Yu, Tulika Mitra
FCCM
2005
IEEE
102views VLSI» more  FCCM 2005»
14 years 1 months ago
A Signature Match Processor Architecture for Network Intrusion Detection
In this paper, we introduce a novel architecture for a hardware based network intrusion detection system (NIDS). NIDSs are becoming critical components of the network infrastructu...
Janardhan Singaraju, Long Bu, John A. Chandy
ICECCS
2005
IEEE
86views Hardware» more  ICECCS 2005»
14 years 1 months ago
Exploiting OS-Level Mechanisms to Implement Mobile Code Security
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution,...
Viktoria Felmetsger, Giovanni Vigna