Sciweavers

513 search results - page 100 / 103
» A Low-Bandwidth Network File System
Sort
View
NDSS
2003
IEEE
14 years 24 days ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 7 months ago
The WebContent XML Store
In this article, we describe the XML storage system used in the WebContent project. We begin by advocating the use of an XML database in order to store WebContent documents, and w...
Benjamin Nguyen, Spyros Zoupanos
COMPUTER
2002
121views more  COMPUTER 2002»
13 years 7 months ago
The Interspace: Concept Navigation Across Distributed Communities
ectly support interaction with abstraction. Using technologies that go beyond searching individual repositories to analyzing and correlating knowledge across multiple sources and s...
Bruce R. Schatz
ISCA
2006
IEEE
133views Hardware» more  ISCA 2006»
14 years 1 months ago
TRAP-Array: A Disk Array Architecture Providing Timely Recovery to Any Point-in-time
RAID architectures have been used for more than two decades to recover data upon disk failures. Disk failure is just one of the many causes of damaged data. Data can be damaged by...
Qing Yang, Weijun Xiao, Jin Ren
SIGUCCS
2004
ACM
14 years 29 days ago
A platform independent tool for evaluating performance of computing equipment for a computer laboratory
Designing computing equipment for a computer laboratory is not easy. In a class in a computer laboratory, it is not unusual that all students do the same thing simultaneously. Tre...
Takashi Yamanoue