Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Maintaining the integrity of large-scale networks is becoming an increasingly daunting task as networks expand at an unprecedented rate. The majority of present network monitoring...
In this paper we explore software-managed address translation. The purpose of the study is to specify the memory management design for a high clock-rate PowerPC implementation in ...
This paper presents a framework for link management within hyper-media documents. The framework includes: (1) an object-oriented document architecture with a consistent interface ...
: In this paper we explain how we have integrated the functionalities of a constraint management system and a temporal data base system to enable a model-based control of systems t...