Using IP-based Virtual Private Network (IP-VPN) technology, a company can establish its virtual private network over public networks. Recently, IP-VPN emerges as one of main techn...
Seung-Jin Baek, Moon-Sang Jeong, Jong-Tae Park, Ta...
This paper describes a new public-key cryptosystem based on the hardness of computing higher residues modulo a composite RSA integer. We introduce two versions of our scheme, one d...
Most casual users of IR systems type short queries. Recent research has shown that adding new words to these queries via adhoc feedback improves the retrieval e ectiveness of such ...
We introduce dag consistency, a relaxed consistency model for distributed shared memory which is suitable for multithreaded programming. We have implemented dag consistency in sof...
Robert D. Blumofe, Matteo Frigo, Christopher F. Jo...
This empirical study examines factors influencing the success of a commercial groupware system in creating group archives and supporting asynchronous communication. The study inve...