Sciweavers

2376 search results - page 352 / 476
» CM - Configuration Change Management
Sort
View
WS
2004
ACM
14 years 2 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
AIRS
2004
Springer
14 years 2 months ago
Automatic Word Clustering for Text Categorization Using Global Information
This paper presents a cluster-based text categorization system which uses class distributional clustering of words. We propose a new clustering model which considers the global in...
Wenliang Chen, Xingzhi Chang, Huizhen Wang, Jingbo...
ARCS
2004
Springer
14 years 2 months ago
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Rainer Buchty, Nevin Heintze, Dino Oliva
COCOON
2004
Springer
14 years 2 months ago
Transshipment Through Crossdocks with Inventory and Time Windows
Abstract. The supply chain between manufacturers and retailers always includes transshipments through a network of locations. A major challenge in making demand meet supply has bee...
Andrew Lim, Zhaowei Miao, Brian Rodrigues, Zhou Xu
GCC
2004
Springer
14 years 2 months ago
Distributed Object Group Framework with Dynamic Reconfigurability of Distributed Services
Abstract. In this paper, we constructed the Distributed Object Group Framework(DOGF) which is a reconfigurable architecture supporting dynamically adaptation of distributed service...
Chang-Sun Shin, Young-Jee Chung, Su-Chong Joo