Sciweavers

2572 search results - page 446 / 515
» codes 2008
Sort
View
IEEESCC
2008
IEEE
14 years 5 months ago
A Secure Information Flow Architecture for Web Services
Current web service platforms (WSPs) often perform all web services-related processing, including securitysensitive information handling, in the same protection domain. Consequent...
Lenin Singaravelu, Jinpeng Wei, Calton Pu
IJCNN
2008
IEEE
14 years 5 months ago
A comparison of architectural varieties in Radial Basis Function Neural Networks
— Representation of knowledge within a neural model is an active field of research involved with the development of alternative structures, training algorithms, learning modes an...
Mehmet Önder Efe, Cosku Kasnakoglu
INFOCOM
2008
IEEE
14 years 5 months ago
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems
—In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring (ITM...
Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao
IPPS
2008
IEEE
14 years 5 months ago
Intermediate checkpointing with conflicting access prediction in transactional memory systems
Transactional memory systems promise to reduce the burden of exposing thread-level parallelism in programs by relieving programmers from analyzing complex inter-thread dependences...
M. M. Waliullah, Per Stenström
IPPS
2008
IEEE
14 years 5 months ago
A transparent non-invasive file data model for algorithmic skeletons
A file data model for algorithmic skeletons is proposed, focusing on transparency and efficiency. Algorithmic skeletons correspond to a high-level programming model that takes a...
Denis Caromel, Mario Leyton