Sciweavers

1022 search results - page 20 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
13 years 11 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna
USENIX
2000
13 years 9 months ago
Towards Availability Benchmarks: A Case Study of Software RAID Systems
Benchmarks have historically played a key role in guiding the progress of computer science systems research and development, but have traditionally neglected the areas of availabi...
Aaron B. Brown, David A. Patterson
COOPIS
2004
IEEE
13 years 11 months ago
Trust-Aware Collaborative Filtering for Recommender Systems
Recommender Systems allow people to find the resources they need by making use of the experiences and opinions of their nearest neighbours. Costly annotations by experts are replac...
Paolo Massa, Paolo Avesani
IPPS
2005
IEEE
14 years 1 months ago
Accelerating Scientific Applications with the SRC-6 Reconfigurable Computer: Methodologies and Analysis
Reconfigurable computing offers the promise of performing computations in hardware to increase performance and efficiency while retaining much of the flexibility of a software sol...
Melissa C. Smith, Jeffrey S. Vetter, Xuejun Liang
COLCOM
2007
IEEE
14 years 2 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham