Sciweavers

2024 search results - page 322 / 405
» A Logic Based Approach for Dynamic Access Control
Sort
View
140
Voted
TCAD
2002
135views more  TCAD 2002»
15 years 2 months ago
Area fill synthesis for uniform layout density
Chemical-mechanical polishing (CMP) and other manufacturing steps in very deep submicron VLSI have varying effects on device and interconnect features, depending on local character...
Yu Chen, Andrew B. Kahng, Gabriel Robins, Alexande...
143
Voted
VIZSEC
2007
Springer
15 years 9 months ago
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
Jason Pearlman, Penny Rheingans
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 7 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
119
Voted
IPPS
2006
IEEE
15 years 9 months ago
SAMIE-LSQ: set-associative multiple-instruction entry load/store queue
The load/store queue (LSQ) is one of the most complex parts of contemporary processors. Its latency is critical for the processor performance and it is usually one of the processo...
Jaume Abella, Antonio González
131
Voted
FGCN
2007
IEEE
119views Communications» more  FGCN 2007»
15 years 9 months ago
A Novel Adaptive Load Shedding Scheme for Data Stream Processing
In this paper, we present a novel feedback control-based load shedding scheme for data stream processing. Firstly we apply system identification to establish a dynamic model to de...
Yunyi Zhang, Chongzheng Huang, Deyun Zhang