Sciweavers

8493 search results - page 137 / 1699
» Implementing a distributed firewall
Sort
View
DRMTICS
2005
Springer
15 years 8 months ago
A Vector Approach to Cryptography Implementation
The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptograph...
Jacques J. A. Fournier, Simon W. Moore
GCC
2005
Springer
15 years 8 months ago
The Architecture and Implementation of Resource Space Model System
Resource Space Model (RSM) is a semantic model to manage and share heterogeneous resources on the Internet. This paper focuses on the general architecture, physical implementation ...
Peng Shi, Yunpeng Xing, Erlin Yao, Zhen Wang, Kehu...
124
Voted
ASAP
2003
IEEE
107views Hardware» more  ASAP 2003»
15 years 8 months ago
Energy Aware Register File Implementation through Instruction Predecode
The register file is a power-hungry device in modern architectures. Current research on compiler technology and computer architectures encourages the implementation of larger dev...
José L. Ayala, Marisa Luisa López-Va...
126
Voted
EUROPAR
2003
Springer
15 years 8 months ago
Implementation and Performance Evaluation of M-VIA on AceNIC Gigabit Ethernet Card
This paper describes the implementation and performance of M-VIA on the AceNIC Gigabit Ethernet card. The AceNIC adapter has several notable hardware features for high-speed commun...
In-Su Yoon, Sang-Hwa Chung, Ben Lee, Hyuk-Chul Kwo...
ACSAC
2000
IEEE
15 years 7 months ago
Implementing Security Policies using the Safe Areas of Computation Approach
The World Wide Web is playing a major role in reducing business costs and in providing convenience to users. Digital Libraries capitalize on this technology to distribute document...
André L. M. dos Santos, Richard A. Kemmerer