Sciweavers

684 search results - page 68 / 137
» Memory Access Characteristics of Network Infrastructure Appl...
Sort
View
GCC
2003
Springer
15 years 3 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
NETWORKING
2004
14 years 11 months ago
Metadata Design for Introspection-Capable Reconfigurable Systems
Global vision consensus on the next generation of wireless mobile communications, broadly termed 4G, sketches a hybrid infrastructure, comprising different wireless access systems ...
Vangelis Gazis, Nancy Alonistioti, Lazaros F. Mera...
CCS
2000
ACM
15 years 2 months ago
Security enhanced mobile agents
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Vijay Varadharajan
ANCS
2006
ACM
15 years 3 months ago
Advanced algorithms for fast and scalable deep packet inspection
Modern deep packet inspection systems use regular expressions to define various patterns of interest in network data streams. Deterministic Finite Automata (DFA) are commonly used...
Sailesh Kumar, Jonathan S. Turner, John Williams
PDP
2005
IEEE
15 years 3 months ago
FOBr: A Version-Based Recovery Protocol For Replicated Databases
Within the field of databases that are deployed in distributed environments there is a need to guarantee consistency among replicas and availability among nodes despite of networ...
Francisco Castro-Company, Luis Irún-Briz, F...