In this paper, we propose an IPSec implementation on Xilinx Virtex-II Pro FPGA1 . We move the key management and negotiation into software function calls that run on the PowerPC p...
In this paper, we describe our first year experiences of administering the NSF-supported Research Experiences for Undergraduates program award. Emerging issues in computer network...
Middleware is often built using a layered architectural style. Layered design provides good separation of the different concerns of middleware, such as communication, marshaling, ...
Several challenging new applications demand the ability to do data mining on resource constrained devices. One such application is that of monitoring physiological data streams ob...
Malicious codes and worms comprise the largest portion of the loss caused the security problem in the Internet. Small worms such as the “Blaster” spread quickly through the eno...
Jangha Kim, Kanghee Lee, Sangwook Kim, Jungtaek Se...