Sciweavers

3999 search results - page 638 / 800
» Design of Optical Access Systems using Computer Modeling
Sort
View
ACSAC
2002
IEEE
15 years 10 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
CCS
2008
ACM
15 years 7 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
EUROPAR
1998
Springer
15 years 9 months ago
Exploiting Atomic Broadcast in Replicated Databases
Database replication protocols have historically been built on top of distributed database systems, and have consequently been designed and implemented using distributed transacti...
Fernando Pedone, Rachid Guerraoui, André Sc...
HICSS
1994
IEEE
106views Biometrics» more  HICSS 1994»
15 years 9 months ago
Trace-Driven Simulation of Decoupled Architectures
The development of accurate trace-driven simulation models has become a key activity in the design of new high-performance computer systems. Tracedriven simulation is fast) enabli...
Sathiamoorthy Manoharan, Nigel P. Topham, A. W. R....
COLING
2010
15 years 3 days ago
Finite-state Scriptural Translation
We use robust and fast Finite-State Machines (FSMs) to solve scriptural translation problems. We describe a phonetico-morphotactic pivot UIT (universal intermediate transcription)...
M. G. Abbas Malik, Christian Boitet, Pushpak Bhatt...