Sciweavers

6110 search results - page 1175 / 1222
» Graceful Network Operations
Sort
View
123
Voted
IPPS
2008
IEEE
15 years 7 months ago
High-speed string searching against large dictionaries on the Cell/B.E. Processor
Our digital universe is growing, creating exploding amounts of data which need to be searched, protected and filtered. String searching is at the core of the tools we use to curb...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
118
Voted
ITNG
2008
IEEE
15 years 7 months ago
Scalable Video Transmission for a Surveillance System
The Area of Interest (AoI) is a distributed scalable video transmission subsystem, for a surveillance system, which concentrates on decrementing the amount of video information tr...
Tomi Räty, Lassi Lehikoinen, François ...
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
15 years 6 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
102
Voted
SRDS
2008
IEEE
15 years 6 months ago
Systematic Structural Testing of Firewall Policies
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. As the quality of protection provided by a firewall dire...
JeeHyun Hwang, Tao Xie, Fei Chen, Alex X. Liu
SRDS
2008
IEEE
15 years 6 months ago
Probabilistic Failure Detection for Efficient Distributed Storage Maintenance
Distributed storage systems often use data replication to mask failures and guarantee high data availability. Node failures can be transient or permanent. While the system must ge...
Jing Tian, Zhi Yang, Wei Chen, Ben Y. Zhao, Yafei ...
« Prev « First page 1175 / 1222 Last » Next »