Sciweavers

4330 search results - page 63 / 866
» Analyzing security architectures
Sort
View
SBACPAD
2005
IEEE
176views Hardware» more  SBACPAD 2005»
15 years 3 months ago
Analyzing and Improving Clustering Based Sampling for Microprocessor Simulation
The time required to simulate a complete benchmark program using the cycle-accurate model of a microprocessor can be prohibitively high. One of the proposed methodologies, represe...
Yue Luo, Ajay Joshi, Aashish Phansalkar, Lizy Kuri...
VLDB
2001
ACM
109views Database» more  VLDB 2001»
15 years 2 months ago
Analyzing energy behavior of spatial access methods for memory-resident data
The proliferation of mobile and pervasive computing devices has brought energy constraints into the limelight, together with performance considerations. Energy-conscious design is...
Ning An, Anand Sivasubramaniam, Narayanan Vijaykri...
IPPS
2010
IEEE
14 years 8 months ago
Modeling and analyzing the effects of firewalls and NATs in P2P swarming systems
Many P2P systems have been designed without taking into account an important factor: a large fraction of Internet users nowadays are located behind a network address translator (NA...
Lucia D'Acunto, Michel Meulpolder, Rameez Rahman, ...
RE
2005
Springer
15 years 3 months ago
ST-Tool: A CASE Tool for Security Requirements Engineering
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the realization that security must be dealt with early on during the requirements pha...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
ICCS
2004
Springer
15 years 3 months ago
Global Discovery Service for JMX Architecture
Distributed computing in wide area networks requires special approach to solve the problem of communication between secure areas. Since there is no possibility to establish connect...
Jacek Midura, Kazimierz Balos, Krzysztof Zielinski