Sciweavers

2746 search results - page 479 / 550
» Application performance on the Direct Access File System
Sort
View
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
13 years 9 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
CASCON
2006
131views Education» more  CASCON 2006»
13 years 10 months ago
STAC: software tuning panels for autonomic control
One aspect of autonomic computing is the ability to identify, separate and automatically tune parameters related to performance, security, robustness and other properties of a sof...
Elizabeth Dancy, James R. Cordy
WCW
2004
Springer
14 years 2 months ago
ShortCuts: Using Soft State to Improve DHT Routing
Distributed hash tables are increasingly being proposed as the core substrate for content delivery applications in the Internet, such as cooperative Web caches, Web index and sear...
Kiran Tati, Geoffrey M. Voelker
CASE
2011
70views more  CASE 2011»
12 years 9 months ago
Automation of assembly and packaging at the micro/nano-scale
— This paper provides a general overview of the material covered in the fullday workshop with the same title devoted to the field of automation in microassembly and packaging at...
Micky Rakotondrabe, Yassine Haddab, Cédric ...
ANCS
2007
ACM
14 years 1 months ago
Towards high-performance flow-level packet processing on multi-core network processors
There is a growing interest in designing high-performance network devices to perform packet processing at flow level. Applications such as stateful access control, deep inspection...
Yaxuan Qi, Bo Xu, Fei He, Baohua Yang, Jianming Yu...