Results 281 to 290 of about 198,891 (343)
Some of the next articles are maybe not open access.
Proceedings of the second edition of the ICN workshop on Information-centric networking, 2012
Today, high-end routers forward hundreds of millions of packets per second by means of longest prefix match on forwarding tables with less than a million IP prefixes. Information-Centric Networking, a novel form of networking where content is requested by its name, poses a new challenge in the design of high-end routers: process at least the same ...
Matteo Varvello +2 more
openaire +1 more source
Today, high-end routers forward hundreds of millions of packets per second by means of longest prefix match on forwarding tables with less than a million IP prefixes. Information-Centric Networking, a novel form of networking where content is requested by its name, poses a new challenge in the design of high-end routers: process at least the same ...
Matteo Varvello +2 more
openaire +1 more source
Caesar, Caesarism, and the historians
Journal of Contemporary History, 1971In I953 Professor Hermann Strassburger shocked a group of German school-teachers when he told them that Caesar was a totally isolated dictator; not a single Roman senator supported his decision to cross the Rubicon.1 The professor did not discuss Caesar's intentions, his final aims, or his role in history.
openaire +1 more source
Face-off Between the CAESAR Lightweight Finalists: ACORN vs. Ascon
International Conference on Field-Programmable Technology, 2018Authenticated ciphers potentially provide resource savings and security improvements over the joint use of secret-key ciphers and message authentication codes.
William Diehl +4 more
semanticscholar +1 more source
Solving the Caesar Problem—with Metaphysics
, 2020But then a worry occurs to him (§). The goal was to define a certain kind of object, a kind including, for instance, the direction of the Earth’s axis. And on reflection it is not clear that DE does that. Certainly DE imposes a strong constraint on the
G. Rosen, S. Yablo
semanticscholar +1 more source
CAESAR-MPSoC: Dynamic and Efficient MPSoC Security Zones
IEEE Computer Society Annual Symposium on VLSI, 2019Dynamic security zones in Multiprocessor System-on-Chip (MP-SoC) has been used to isolate sensitive applications from possible attackers. These physical wrappers are usually configured through programmable hardware firewalls.
Siavoosh Payandeh Azad +3 more
semanticscholar +1 more source
2018 6th International Conference on Cyber and IT Service Management (CITSM), 2018
Security of data or documents is a very important thing. Given that nowadays many exchange data electronically. It will result in a lot of processes that can compromise the security of data.
M. Sinaga +3 more
semanticscholar +1 more source
Security of data or documents is a very important thing. Given that nowadays many exchange data electronically. It will result in a lot of processes that can compromise the security of data.
M. Sinaga +3 more
semanticscholar +1 more source
Abstract This chapter analyzes Julius Caesar’s writings on the Gallic Wars, showcasing his strategic mastery and purposeful narrative style. Caesar crafts his account in three stages starting with senatorial reports and evolving into polished third-person compositions aimed at Roman audiences, integrating propaganda and rhetorical ...
openaire +1 more source
openaire +1 more source
Proceedings of the 2nd workshop on Middleware for service oriented computing: held at the ACM/IFIP/USENIX International Middleware Conference, 2007
Recent research advances in Peer-to-Peer (P2P) computing have enabled the P2P paradigm to be used for developing complex applications beyond file sharing and data storage. These applications have drawn significant benefits, specifically scalability and low cost, from the P2P paradigm.
Lipo Chan +3 more
openaire +1 more source
Recent research advances in Peer-to-Peer (P2P) computing have enabled the P2P paradigm to be used for developing complex applications beyond file sharing and data storage. These applications have drawn significant benefits, specifically scalability and low cost, from the P2P paradigm.
Lipo Chan +3 more
openaire +1 more source
CAESAR: context-aware explanation based on supervised attention for service recommendations
Journal of Intelligence and Information Systems, 2020Lei Li, Li Chen, Ruihai Dong
semanticscholar +1 more source

