Intrusion prevention systems determine whether incoming traffic matches a database of signatures, where each signature in the database represents an attack or a vulnerability. IPSs...
Daniel Luchaup, Randy Smith, Cristian Estan, Somes...
We present an application-driven customization methodology for energy-efficient inter-core communication in embedded multiprocessors. The methodology leverages configurable cach...
In this paper, we present the design and implementation of a distributed sensor network application for embedded, isolated-word, real-time speech recognition. In our system design...
Chung-Ching Shen, William Plishker, Shuvra S. Bhat...
Spreadsheets are one of the most common end-user programming environments in use today, and their importance in the business world continues to grow. Although considered critical ...
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...