Sciweavers

4134 search results - page 679 / 827
» Collaborative Practice Research
Sort
View
FDTC
2008
Springer
87views Cryptology» more  FDTC 2008»
15 years 5 months ago
Silicon-level Solutions to Counteract Passive and Active Attacks
This article presents a family of cryptographic ASICs, called SecMat, designed in CMOS 130 nanometer technology by the authors with the help of STMicroelectronics. The purpose of ...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
118
Voted
FIS
2008
15 years 5 months ago
Challenges and Opportunities for More Meaningful and Sustainable Internet Systems
Abstract. Despite its technological success story, the Internet is facing a rampant growth of isolated ontologies and a massive dump of unstructured legacy data. Therefore, archite...
Pieter De Leenheer, Stijn Christiaens
124
Voted
IMC
2007
ACM
15 years 5 months ago
A data streaming algorithm for estimating entropies of od flows
Entropy has recently gained considerable significance as an important metric for network measurement. Previous research has shown its utility in clustering traffic and detecting ...
Haiquan (Chuck) Zhao, Ashwin Lall, Mitsunori Ogiha...
134
Voted
ASAP
2010
IEEE
148views Hardware» more  ASAP 2010»
15 years 5 months ago
Function flattening for lease-based, information-leak-free systems
Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T...
AAAI
2010
15 years 4 months ago
Local Search in Histogram Construction
The problem of dividing a sequence of values into segments occurs in database systems, information retrieval, and knowledge management. The challenge is to select a finite number ...
Felix Halim, Panagiotis Karras, Roland H. C. Yap