Sciweavers

5577 search results - page 177 / 1116
» E2K Technology and Implementation
Sort
View
ACMSE
2009
ACM
15 years 6 months ago
Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting
In a world of increasing Internet connectivity coupled with increasing computer security risks, security conscious network applications implementing blacklisting technology are be...
J. Lane Thames, Randal Abler, David Keeling
82
Voted
ISPD
2004
ACM
171views Hardware» more  ISPD 2004»
15 years 5 months ago
Structured ASIC, evolution or revolution?
This paper describes the structured ASIC technology and impacts to the implementation flow. With an optimized and programmable structure, the structured ASIC technology indeed int...
Kun-Cheng Wu, Yu-Wen Tsai
110
Voted
SOUPS
2005
ACM
15 years 5 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
RIAO
2000
15 years 1 months ago
The TREC Spoken Document Retrieval Track: A Success Story
This paper describes work within the NIST Text REtrieval Conference (TREC) over the last three years in designing and implementing evaluations of Spoken Document Retrieval (SDR) t...
John S. Garofolo, Cedric G. P. Auzanne, Ellen M. V...
WWW
2001
ACM
16 years 9 days ago
P-Jigsaw: Extending Jigsaw with Rules Assisted Cache Management
P-Jigsaw is an extension of W3C's Jigsaw Web-server implementing a cache management strategy for replacement and pre-fetching based on association rules mining from the acces...
Bin Lan, Stéphane Bressan