Sciweavers

432 search results - page 47 / 87
» An Architectural Overview of QNX
Sort
View
IJCNN
2006
IEEE
15 years 3 months ago
Patterns, Hypergraphs and Embodied General Intelligence
—It is proposed that the creation of Artificial General Intelligence (AGI) at the human level and ultimately beyond is a problem addressable via integrating computer science algo...
Ben Goertzel
ISCAS
2006
IEEE
163views Hardware» more  ISCAS 2006»
15 years 3 months ago
ASIC hardware implementation of the IDEA NXT encryption algorithm
— Symmetric-key block ciphers are often used to provide data confidentiality with low complexity, especially in the case of dedicated hardware implementations. IDEA NXT is a nov...
Marco Macchetti, Wenyu Chen
SAINT
2006
IEEE
15 years 3 months ago
Towards an Enterprise Location Service
Radio Frequency Identification (RFID) technology has a lot of potential to automate business processes and improve visibility across the supply chain. To realize the full potenti...
Christof Roduner, Christian Floerkemeier
CIMCA
2005
IEEE
15 years 3 months ago
Fibered Guard - A Hybrid Intelligent Approach to Denial of Service Prevention
This paper describes the system “Fibered Guard”, which is a hybrid intelligent web access management approach for the prevention of Denial of Service (DoS) and Distributed Deni...
Marvin Oliver Schneider, Jacques Calmet
GRID
2005
Springer
15 years 3 months ago
Web services and grid security vulnerabilities and threats analysis and model
The paper provides an overview of available web applications and Web Services security vulnerability models and proposes a classification of the potential Grid and Web Services at...
Yuri Demchenko, Leon Gommans, Cees T. A. M. de Laa...