Sciweavers

8503 search results - page 1348 / 1701
» Secure Software Architectures
Sort
View
120
Voted
INFOCOM
2000
IEEE
15 years 8 months ago
Design, Implementation and Performance of a Content-Based Switch
Abstract— In this paper, we share our experience in designing and building a content based switch which we call L5. In addition to the layer 2-3-4 information available in the pa...
George Apostolopoulos, David Aubespin, Vinod G. J....
141
Voted
HICSS
1999
IEEE
155views Biometrics» more  HICSS 1999»
15 years 8 months ago
Agent Communication Languages for Information-Centric Agent Communities
As the complexity and application scope of agent-based systems increases, the requirements placed on Agent Communication Languages have also increased with it. Currently-available...
Marian H. Nodine, Damith Chandrasekara
130
Voted
SIGMETRICS
1997
ACM
103views Hardware» more  SIGMETRICS 1997»
15 years 7 months ago
Performance Issues of Enterprise Level Web Proxies
Enterprise level web proxies relay world-wide web traffic between private networks and the Internet. They improve security, save network bandwidth, and reduce network latency. Wh...
Carlos Maltzahn, Kathy J. Richardson, Dirk Grunwal...
152
Voted
IDMS
1997
Springer
97views Multimedia» more  IDMS 1997»
15 years 7 months ago
A Soft Real Time Scheduling Server in UNIX Operating System
We present a soft real-time CPU server for Continuous Media processing in the UNIX environment. The server is a daemon process from which applications can request and acquire soft...
Hao-Hua Chu, Klara Nahrstedt
129
Voted
DIM
2007
ACM
15 years 7 months ago
Receipt management- transaction history based trust establishment
In a history-based trust-management system, users and service providers use information about past transactions to make trust-based decisions concerning current transactions. One ...
Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bert...
« Prev « First page 1348 / 1701 Last » Next »