Sciweavers

851 search results - page 56 / 171
» Managing (Requirements) Evolutions of High Assurance Systems
Sort
View
IDEAS
2005
IEEE
103views Database» more  IDEAS 2005»
15 years 7 months ago
Persistent Middle Tier Components Without Logging
Enterprise applications need to be highly available and scalable. In the past, this has required “stateless” applications, which essentially require the application to manage ...
David B. Lomet
ARCS
2004
Springer
15 years 7 months ago
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Rainer Buchty, Nevin Heintze, Dino Oliva
ACSAC
2001
IEEE
15 years 5 months ago
Architecture and Applications for a Distributed Embedded Firewall
The distributed firewall is an important new line of network defense. It provides fine-grained access control to augment the protections afforded by the traditional perimeter fire...
Charles Payne, Tom Markham
108
Voted
IADIS
2003
15 years 3 months ago
Information Management and Interoperability Strategies: The Case for Digital Identifiers
The move from the current compartmentalised systems into an interoperable environment is the central challenge facing digital development this decade. In the quest for a semantic ...
Robin Wilson
ELPUB
2006
ACM
15 years 7 months ago
A New Concept in High Resolution Internet Image Browsing
Various new imaging techniques have been used at the C2RMF, in order to digitize paintings and objects. These techniques are used for extensive and detailed non-destructive analys...
Denis Pitzalis, Ruven Pillay, Christian Lahanier