Sciweavers

500 search results - page 42 / 100
» Product Based Interoperability - Approaches and Requirements
Sort
View
HIPEAC
2005
Springer
15 years 5 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
HOTI
2002
IEEE
15 years 4 months ago
Architecture and Hardware for Scheduling Gigabit Packet Streams
We present an architecture and hardware for scheduling gigabit packet streams in server clusters that combines a Network Processor datapath and an FPGA for use in server NICs and ...
Raj Krishnamurthy, Sudhakar Yalamanchili, Karsten ...
ITCC
2005
IEEE
15 years 5 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
WWW
2010
ACM
15 years 6 months ago
The paths more taken: matching DOM trees to search logs for accurate webpage clustering
An unsupervised clustering of the webpages on a website is a primary requirement for most wrapper induction and automated data extraction methods. Since page content can vary dras...
Deepayan Chakrabarti, Rupesh R. Mehta
KR
2004
Springer
15 years 5 months ago
Multidimensional Mereotopology
To support commonsense reasoning about space, we require a qualitative calculus of spatial entities and their relations. One requirement for such a calculus, which has not so far ...
Antony Galton