Sciweavers

6271 search results - page 17 / 1255
» The RACE network architecture
Sort
View
104
Voted
CCS
2008
ACM
15 years 2 months ago
Enforcing authorization policies using transactional memory introspection
Correct enforcement of authorization policies is a difficult task, especially for multi-threaded software. Even in carefully-reviewed code, unauthorized access may be possible in ...
Arnar Birgisson, Mohan Dhawan, Úlfar Erling...
138
Voted
CSREASAM
2006
15 years 1 months ago
Architectural Framework Design for Authentication Mechanism in Mobile Adhoc Networks (MANETs)
Wireless ad-hoc networks do not rely on a pre-existing network structure and are characterized by dynamic changes in the topology. This characteristic makes it difficult to perform...
Rajasekhar Yakkali, Gregory Vert
COMPCON
1996
IEEE
15 years 4 months ago
64-bit and Multimedia Extensions in the PA-RISC 2.0 Architecture
This paper describes the architectural extensions to the
Ruby B. Lee, Jerome C. Huck
98
Voted
IWAN
2000
Springer
15 years 4 months ago
Two Rule-Based Building-Block Architectures for Policy-Based Network Control
Policy-based networks can be customized by users by injecting programs called policies into the network nodes. So if general-purpose functions can be specified in a policy-based ne...
Yasusi Kanada
181
Voted
JVA
2006
IEEE
15 years 6 months ago
Features of Future Network Processor Architectures
As network applications are becoming increasingly sophisticated and internet traffic is getting heavier, future network processors must continue processing computation-intensive ...
Kyueun Yi, Jean-Luc Gaudiot