Sciweavers

5722 search results - page 872 / 1145
» Security Function Interactions
Sort
View
136
Voted
HOTOS
2009
IEEE
15 years 8 months ago
An End to the Middle
The last fifteen years has seen a vast proliferation of middleboxes to solve all manner of persistent limitations in the Internet protocol suite. Examples include firewalls, NATs,...
Colin Dixon, Arvind Krishnamurthy, Thomas E. Ander...
CHES
2006
Springer
179views Cryptology» more  CHES 2006»
15 years 8 months ago
Offline Hardware/Software Authentication for Reconfigurable Platforms
Abstract. Many Field-Programmable Gate Array (FPGA) based systems utilize third-party intellectual property (IP) in their development. When they are deployed in non-networked envir...
Eric Simpson, Patrick Schaumont
161
Voted
CIKM
2006
Springer
15 years 8 months ago
Privacy preserving sequential pattern mining in distributed databases
Research in the areas of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent years. ...
Vishal Kapoor, Pascal Poncelet, François Tr...
COLT
2006
Springer
15 years 8 months ago
Online Learning with Variable Stage Duration
We consider online learning in repeated decision problems, within the framework of a repeated game against an arbitrary opponent. For repeated matrix games, well known results esta...
Shie Mannor, Nahum Shimkin
135
Voted
GCC
2006
Springer
15 years 7 months ago
On Interoperability: The Execution Management Perspective Based on ChinaGrid Support Platform*
Interoperability between different Grid implementations is attracting more and more attention to seamlessly job execution. In this paper, one approach is proposed to implement the...
Yongwei Wu, Likun Liu, Weimin Zheng, Feng He