Results 281 to 290 of about 198,891 (343)
Some of the next articles are maybe not open access.

Caesar

Proceedings of the second edition of the ICN workshop on Information-centric networking, 2012
Today, high-end routers forward hundreds of millions of packets per second by means of longest prefix match on forwarding tables with less than a million IP prefixes. Information-Centric Networking, a novel form of networking where content is requested by its name, poses a new challenge in the design of high-end routers: process at least the same ...
Matteo Varvello   +2 more
openaire   +1 more source

Caesar, Caesarism, and the historians

Journal of Contemporary History, 1971
In I953 Professor Hermann Strassburger shocked a group of German school-teachers when he told them that Caesar was a totally isolated dictator; not a single Roman senator supported his decision to cross the Rubicon.1 The professor did not discuss Caesar's intentions, his final aims, or his role in history.
openaire   +1 more source

Face-off Between the CAESAR Lightweight Finalists: ACORN vs. Ascon

International Conference on Field-Programmable Technology, 2018
Authenticated ciphers potentially provide resource savings and security improvements over the joint use of secret-key ciphers and message authentication codes.
William Diehl   +4 more
semanticscholar   +1 more source

Solving the Caesar Problem—with Metaphysics

, 2020
But then a worry occurs to him (§). The goal was to define a certain kind of object, a kind including, for instance, the direction of the Earth’s axis. And on reflection it is not clear that DE does that. Certainly DE imposes a strong constraint on the
G. Rosen, S. Yablo
semanticscholar   +1 more source

CAESAR-MPSoC: Dynamic and Efficient MPSoC Security Zones

IEEE Computer Society Annual Symposium on VLSI, 2019
Dynamic security zones in Multiprocessor System-on-Chip (MP-SoC) has been used to isolate sensitive applications from possible attackers. These physical wrappers are usually configured through programmable hardware firewalls.
Siavoosh Payandeh Azad   +3 more
semanticscholar   +1 more source

Hybrid Cryptography WAKE (Word Auto Key Encryption) and Binary Caesar Cipher Method For Data Security

2018 6th International Conference on Cyber and IT Service Management (CITSM), 2018
Security of data or documents is a very important thing. Given that nowadays many exchange data electronically. It will result in a lot of processes that can compromise the security of data.
M. Sinaga   +3 more
semanticscholar   +1 more source

Caesar on Being Caesar

Abstract This chapter analyzes Julius Caesar’s writings on the Gallic Wars, showcasing his strategic mastery and purposeful narrative style. Caesar crafts his account in three stages starting with senatorial reports and evolving into polished third-person compositions aimed at Roman audiences, integrating propaganda and rhetorical ...
openaire   +1 more source

CAESAR

Proceedings of the 2nd workshop on Middleware for service oriented computing: held at the ACM/IFIP/USENIX International Middleware Conference, 2007
Recent research advances in Peer-to-Peer (P2P) computing have enabled the P2P paradigm to be used for developing complex applications beyond file sharing and data storage. These applications have drawn significant benefits, specifically scalability and low cost, from the P2P paradigm.
Lipo Chan   +3 more
openaire   +1 more source

CAESAR: context-aware explanation based on supervised attention for service recommendations

Journal of Intelligence and Information Systems, 2020
Lei Li, Li Chen, Ruihai Dong
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy