Sciweavers

2954 search results - page 490 / 591
» Beyond
Sort
View
IPCCC
2007
IEEE
15 years 6 months ago
Optimising Networks Against Malware
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solutions that have been proposed to counter this threat are based on our ability ...
Pierre-Marc Bureau, José M. Fernandez
IROS
2007
IEEE
132views Robotics» more  IROS 2007»
15 years 6 months ago
In-vivo pan/tilt endoscope with integrated light source
— Endoscopic imaging is still dominated by the paradigm of pushing long sticks into small openings. This approach has a number of limitations for minimal access surgery, such as ...
Tie Hu, Peter K. Allen, Dennis L. Fowler
ISCA
2007
IEEE
196views Hardware» more  ISCA 2007»
15 years 6 months ago
Anton, a special-purpose machine for molecular dynamics simulation
The ability to perform long, accurate molecular dynamics (MD) simulations involving proteins and other biological macromolecules could in principle provide answers to some of the ...
David E. Shaw, Martin M. Deneroff, Ron O. Dror, Je...
ISCA
2007
IEEE
103views Hardware» more  ISCA 2007»
15 years 6 months ago
Ginger: control independence using tag rewriting
The negative performance impact of branch mis-predictions can be reduced by exploiting control independence (CI). When a branch mis-predicts, the wrong-path instructions up to the...
Andrew D. Hilton, Amir Roth
NDSS
2007
IEEE
15 years 6 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith