Sciweavers

8493 search results - page 1312 / 1699
» Implementing a distributed firewall
Sort
View
132
Voted
QSIC
2005
IEEE
15 years 10 months ago
Runtime Validation of Behavioural Contracts for Component Software
In component software, the independence of components is achieved by separating their interfaces from implementations. The interface definition of a component serves as the contr...
Yan Jin, Jun Han
RTCSA
2005
IEEE
15 years 10 months ago
FPGA-Based Content Protection System for Embedded Consumer Electronics
We propose a new architecture for a content protection system that conceals confidential data and algorithms in an FPGA as electrical circuits. This architecture is designed for a...
Hiroyuki Yokoyama, Kenji Toda
138
Voted
RTSS
2005
IEEE
15 years 10 months ago
Improving Soft Real-Time Performance through Better Slack Reclaiming
Modern operating systems frequently support applications with a variety of timing constraints including hard real-time, soft real-time, and best-effort. To guarantee performance, ...
Caixue Lin, Scott A. Brandt
SSDBM
2005
IEEE
218views Database» more  SSDBM 2005»
15 years 10 months ago
The "Best K" for Entropy-based Categorical Data Clustering
With the growing demand on cluster analysis for categorical data, a handful of categorical clustering algorithms have been developed. Surprisingly, to our knowledge, none has sati...
Keke Chen, Ling Liu
WISE
2005
Springer
15 years 10 months ago
Peer-Sensitive ObjectRank - Valuing Contextual Information in Social Networks
Building on previous work on how to model contextual information for desktop search and how to implement semantically rich information exchange in social networks, we define a new...
Andrei Damian, Wolfgang Nejdl, Raluca Paiu
« Prev « First page 1312 / 1699 Last » Next »