Sciweavers

2178 search results - page 351 / 436
» Toward Systemically Secure IT Architectures
Sort
View
SIGMOD
2003
ACM
104views Database» more  SIGMOD 2003»
14 years 8 months ago
TelegraphCQ: Continuous Dataflow Processing
Increasingly pervasive networks are leading towards a world where data is constantly in motion. In such a world, conventional techniques for query processing, which were developed...
Sirish Chandrasekaran, Owen Cooper, Amol Deshpande...
GCC
2003
Springer
14 years 1 months ago
iCell: Integration Unit in Enterprise Cooperative Environment
An enterprise cooperative environment is combination of emerging technologies and methodologies on which both enterprise employee and customers can perform necessary business activ...
Ruey-Shyang Wu, Shyan-Ming Yuan, Anderson Liang, D...
MICRO
2010
IEEE
167views Hardware» more  MICRO 2010»
13 years 5 months ago
Erasing Core Boundaries for Robust and Configurable Performance
Single-thread performance, reliability and power efficiency are critical design challenges of future multicore systems. Although point solutions have been proposed to address thes...
Shantanu Gupta, Shuguang Feng, Amin Ansari, Scott ...
DAC
2006
ACM
14 years 8 months ago
A parallelized way to provide data encryption and integrity checking on a processor-memory bus
This paper describes a novel engine, called PE-ICE (Parallelized Encryption and Integrity Checking Engine), enabling to guarantee confidentiality and integrity of data exchanged b...
Reouven Elbaz, Lionel Torres, Gilles Sassatelli, P...
INFOCOM
2006
IEEE
14 years 1 months ago
Intelligent Distribution of Intrusion Prevention Services on Programmable Routers
— The recent surge of new viruses and host attacks in the Internet and the tremendous propagation speed of selfdistributing attacks has made network security a pressing issue. To...
Andreas Hess, Hans-Florian Geerdes, Roland Wess&au...