Sciweavers

14824 search results - page 2628 / 2965
» Security - Introduction
Sort
View
137
Voted
EUROCRYPT
2003
Springer
15 years 8 months ago
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction
Perfectly secret message transmission can be realized with only partially secret and weakly correlated information shared by the parties as soon as this information allows for the ...
Renato Renner, Stefan Wolf
132
Voted
EUROPAR
2003
Springer
15 years 8 months ago
Delivering Data Management for Engineers on the Grid
Engineering design search and optimisation is a computationally expensive and data intensive process. Grid technology offers great potential to increase the efficiency of this proc...
Jasmin L. Wason, Marc Molinari, Zhuoan Jiao, Simon...
FPL
2003
Springer
164views Hardware» more  FPL 2003»
15 years 8 months ago
Fast, Large-Scale String Match for a 10Gbps FPGA-Based Network Intrusion Detection System
Intrusion Detection Systems such as Snort scan incoming packets for evidence of security threats. The most computation-intensive part of these systems is a text search against hund...
Ioannis Sourdis, Dionisios N. Pnevmatikatos
GCC
2003
Springer
15 years 8 months ago
An OGSA-Based Quality of Service Framework
Grid computing provides a robust paradigm to aggregate disparate resources in a secure and controlled environment. Grid architectures require an underpinning Quality of Service (Qo...
Rashid J. Al-Ali, Kaizar Amin, Gregor von Laszewsk...
172
Voted
GCC
2003
Springer
15 years 8 months ago
The Design and Implementation of the GridLab Information Service
The grid computing paradigm emerged recently as a new field distinguished from traditional distributed computing because of its focus on large-scale resource sharing and innovativ...
Giovanni Aloisio, Massimo Cafaro, Italo Epicoco, D...
« Prev « First page 2628 / 2965 Last » Next »