Sciweavers

1587 search results - page 282 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
SIGCOMM
2009
ACM
15 years 4 months ago
Crossbow: from hardware virtualized NICs to virtualized networks
This paper describes a new architecture for achieving network virtualization using virtual NICs (VNICs) as the building blocks. The VNICs can be associated with dedicated and inde...
Sunay Tripathi, Nicolas Droux, Thirumalai Srinivas...
ERSA
2006
102views Hardware» more  ERSA 2006»
14 years 11 months ago
Process Isolation for Reconfigurable Hardware
One of the pillars of trust-worthy computing is process isolation, the ability to keep process data private from other processes running on the same device. While embedded operati...
Herwin Chan, Patrick Schaumont, Ingrid Verbauwhede
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
14 years 11 months ago
Support vector machine classifiers for sequential decision problems
Classification problems in critical applications such as health care or security often require very high reliability because of the high costs of errors. In order to achieve this r...
Eladio Rodriguez Diaz, David A. Castaon
HPDC
2010
IEEE
14 years 11 months ago
A data transfer framework for large-scale science experiments
Modern scientific experiments can generate hundreds of gigabytes to terabytes or even petabytes of data that may furthermore be maintained in large numbers of relatively small fil...
Wantao Liu, Brian Tieman, Rajkumar Kettimuthu, Ian...
INTENV
2010
14 years 4 months ago
Proactive Intention Recognition for Home Ambient Intelligence
We explore a coherent combination of two jointly implemented logic programming based systems, namely those of Evolution Prospection and Intention Recognition, to address a number o...
Han The Anh, Luís Moniz Pereira