Sciweavers

1530 search results - page 112 / 306
» Design and Implementation of a Key-Lifecycle Management Syst...
Sort
View
149
Voted
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
15 years 9 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee
137
Voted
JCP
2008
128views more  JCP 2008»
15 years 3 months ago
Life Cycle for Change Management in Business Processes using Semantic Technologies
In a fast changing market environment the task of reducing the downtime for change management of business processes has high importance. Ensuring that IT reflects the updated busin...
Uttam Kumar Tripathi, Knut Hinkelmann, Daniela Fel...
122
Voted
CASCON
1996
113views Education» more  CASCON 1996»
15 years 4 months ago
Network management views using delegated agents
The lack of an appropriate external data model is one of the reasons for the dearth of eective network management applications. Many network management computations over Managemen...
Germán S. Goldszmidt
ODRL
2004
15 years 4 months ago
Distributed Digital Rights Management: The EduSource Approach to DRM
This paper describes the design and implementation of the distributed digital rights management (DDRM) system as undertaken by the eduSource project, a national network of learnin...
Stephen Downes, Gilbert Babin, Luc Belliveau, Raph...
HPTS
1993
147views Database» more  HPTS 1993»
15 years 7 months ago
Generic Action Support for Distributed, Cooperative Applications
Elements of transaction processing become more and more accepted as a base for general purpose distributed computing.We have developed an action concept with an extended functiona...
Edgar Nett, Michael Mock