Sciweavers

2422 search results - page 451 / 485
» Security Policy Consistency
Sort
View
GCC
2006
Springer
15 years 1 months ago
UGE4B: An Universal Grid Environment for Bioinformatics Research
Recent years, grid technology has been used widely in the fields of scientific research. In this paper, we present an universal grid environment for Bioinformatics Research (UGE4B...
Gang Chen, Yongwei Wu, Weimin Zheng
CLUSTER
2001
IEEE
15 years 1 months ago
NPACI Rocks: Tools and Techniques for Easily Deploying Manageable Linux Clusters
High-performance computing clusters (commodity hardware with low-latency, high-bandwidth interconnects) based on Linux, are rapidly becoming the dominant computing platform for a ...
Philip M. Papadopoulos, Mason J. Katz, Greg Bruno
ASPDAC
2008
ACM
126views Hardware» more  ASPDAC 2008»
14 years 11 months ago
A Multi-Processor NoC platform applied on the 802.11i TKIP cryptosystem
Since 2001, there have been a myriad of papers on systematic analysis of Multi-Processor System on Chip (MPSoC) and Network on Chip (NoC). Nevertheless, we only have a few of their...
Jung-Ho Lee, Sung-Rok Yoon, Kwang-Eui Pyun, Sin-Ch...
79
Voted
DAC
2005
ACM
14 years 11 months ago
A watermarking system for IP protection by a post layout incremental router
In this paper, we introduce a new watermarking system for IP protection on post-layout design phase. Firstly the copyright is encrypted by DES (Data Encryption Standard) and then ...
Tingyuan Nie, Tomoo Kisaka, Masahiko Toyonaga
ICISC
2008
123views Cryptology» more  ICISC 2008»
14 years 11 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...