Sciweavers

485 search results - page 86 / 97
» Integrity and Integration Issues for Nano-Tube Based Interco...
Sort
View
88
Voted
ESORICS
2007
Springer
15 years 5 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
ISCC
2006
IEEE
115views Communications» more  ISCC 2006»
15 years 5 months ago
QoS-Aware Middleware for Web Services Composition - A Qualitative Approach
— One of the benefits of web services is their ability to participate in a web services composition process. Therefore, an end-to-end QoS infrastructure should be established. W...
Hassan Issa, Chadi Assi, Mourad Debbabi
IEEECIT
2005
IEEE
15 years 5 months ago
A Performance and Power Co-optimization Approach for Modern Processors
In embedded systems, performance and power are important inter-related issues that cannot be decoupled. Expensive and extensive simulations in a processor design space are usually...
Yongxin Zhu, Weng-Fai Wong, Cheng-Kok Koh
SIGMOD
2005
ACM
133views Database» more  SIGMOD 2005»
15 years 5 months ago
A Nested Relational Approach to Processing SQL Subqueries
One of the most powerful features of SQL is the use of nested queries. Most research work on the optimization of nested queries focuses on aggregate subqueries. However, the solut...
Bin Cao, Antonio Badia
83
Voted
RT
1999
Springer
15 years 3 months ago
Space-Time Hierarchical Radiosity
This paper presents a new hierarchical simulation algorithm allowing the calculation of radiosity solutions for time-dependent scenes where all motion is known a priori. Such solut...
Cyrille Damez, François X. Sillion