Sciweavers

414 search results - page 77 / 83
» Secure Border Control Processes
Sort
View
79
Voted
COMPSEC
2008
116views more  COMPSEC 2008»
14 years 9 months ago
Enforcing memory policy specifications in reconfigurable hardware
While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reco...
Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timo...
100
Voted
ALIFE
2006
14 years 9 months ago
A Comprehensive Overview of the Applications of Artificial Life
We review the applications of artificial life (ALife), the creation of synthetic life on computers to study, simulate, and understand living systems. The definition and features of...
Kyung-Joong Kim, Sung-Bae Cho
96
Voted
MTA
2006
125views more  MTA 2006»
14 years 9 months ago
QCWS: an implementation of QoS-capable multimedia web services
QoS, that defines service quality such as latency, availability, timeliness and reliability, is important for web applications that provide real-time information, multimedia conte...
Tao Yu, Kwei-Jay Lin
84
Voted
CERA
2004
89views more  CERA 2004»
14 years 9 months ago
An Electronic Cash Scheme and its Management
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
Hua Wang, Yanchun Zhang, Jinli Cao
ISSA
2004
14 years 11 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski