Sciweavers

5344 search results - page 978 / 1069
» Privacy-Preserving Set Operations
Sort
View
ANCS
2006
ACM
15 years 8 months ago
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms
The fast spreading worm is becoming one of the most serious threats to today’s networked information systems. A fast spreading worm could infect hundreds of thousands of hosts w...
Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang
ANCS
2006
ACM
15 years 8 months ago
CAMP: fast and efficient IP lookup architecture
A large body of research literature has focused on improving the performance of longest prefix match IP-lookup. More recently, embedded memory based architectures have been propos...
Sailesh Kumar, Michela Becchi, Patrick Crowley, Jo...
ASPDAC
2006
ACM
133views Hardware» more  ASPDAC 2006»
15 years 8 months ago
Crosstalk analysis using reconvergence correlation
Abstract— In the UDSM era, crosstalk is an area of considerable concern for designers, as it can have a considerable impact on the yield, both in terms of functionality and opera...
Sachin Shrivastava, Rajendra Pratap, Harindranath ...
ASPLOS
2006
ACM
15 years 8 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...
CSCW
2006
ACM
15 years 8 months ago
AwareMedia: a shared interactive display supporting social, temporal, and spatial awareness in surgery
Several CSCW studies have shown that coordination of work in hospitals is particular challenging, and that clinicians put much effort into maintaining mutual awareness on the flo...
Jakob E. Bardram, Thomas Riisgaard Hansen, Mads S&...