Sciweavers

2058 search results - page 366 / 412
» Concast: Design and Implementation of a New Network Service
Sort
View
ISSRE
2008
IEEE
15 years 6 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...
RTCSA
2005
IEEE
15 years 5 months ago
FPGA-Based Content Protection System for Embedded Consumer Electronics
We propose a new architecture for a content protection system that conceals confidential data and algorithms in an FPGA as electrical circuits. This architecture is designed for a...
Hiroyuki Yokoyama, Kenji Toda
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
15 years 5 months ago
The Illusion of Effective Management Information: A Critical Perspective
The availability of effective management information is essential when coping with today’s complexity and dynamism, both within and around organizations. Information technology ...
Fred A. B. Lohman, Henk G. Sol, Gert-Jan de Vreede
MICRO
1997
IEEE
82views Hardware» more  MICRO 1997»
15 years 4 months ago
Procedure Based Program Compression
Cost and power consumption are two of the most important design factors for many embedded systems, particularly consumer devices. Products such as Personal Digital Assistants, pag...
Darko Kirovski, Johnson Kin, William H. Mangione-S...
ASPDAC
2000
ACM
109views Hardware» more  ASPDAC 2000»
15 years 3 months ago
A technique for QoS-based system partitioning
Quality of service (QoS) has been an important topic of many research communities. Combined with an advanced and retargetable compiler, variability of applicationsspecific very lar...
Johnson S. Kin, Chunho Lee, William H. Mangione-Sm...