In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
In the environment of wide-area networks such as the Internet, distributed query processing becomes problematic due to the changing coming from both underlying networks and user...
Many object-oriented methods have assumed classbased approaches, without considering prototype-based ones. Some authors, while admitting prototypes as a useful concept, only envis...
Birgitte Krogh, Sean Levy, Allen H. Dutoit, Eswara...
For circuits where there may be latches with no reset line, we show how to replace some of them with combinational logic. All previous work in sequential optimization by latch rem...
In this paper, we present a network service specifically designed for multimedia servers. It uses a histogram based traffic characterization and an overload control protocol to el...