Sciweavers

2178 search results - page 166 / 436
» Toward Systemically Secure IT Architectures
Sort
View
CF
2004
ACM
14 years 2 months ago
Opportunities and challenges in application-tuned circuits and architectures based on nanodevices
Nanoelectronics research has primarily focused on devices. By contrast, not much has been published on innovations at higher layers: we know little about how to construct circuits...
Teng Wang, Zhenghua Qi, Csaba Andras Moritz
WSC
2004
13 years 10 months ago
Applying a Cognitive Architecture to Control of Virtual Non-Player Characters
CHI Systems, under contract to the U. S. Army Research Institute, is developing an immersive training system, called Virtual Environment Cultural Training for Operational Readines...
Chris McCollum, Charles Barba, Thomas Santarelli, ...
CMS
2003
171views Communications» more  CMS 2003»
13 years 10 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
AINA
2006
IEEE
14 years 3 months ago
Distributed Key Management for Secure Role based Messaging
Secure Role Based Messaging (SRBM) augments messaging systems with role oriented communication in a secure manner. Role occupants can sign and decrypt messages on behalf of roles....
Gansen Zhao, Sassa Otenko, David W. Chadwick
SSR
1997
98views more  SSR 1997»
13 years 10 months ago
Toward Software Plug-and-Play
The growing size and complexity of systems has revealed many shortcomings of existing software engineering practices, for example, lack of scalability. This in turn raised interes...
François Bronsard, Douglas Bryan, Wojtek Ko...