Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the license to misbehave, some varia...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
WormBase (http://wormbase.org), the public database for genomics and biology of Caenorhabditis elegans, has been restructured for stronger performance and expanded for richer biol...
Erich M. Schwarz, Igor Antoshechkin, Carol Bastian...
Block-level continuous data protection (CDP) logs every disk block update so that disk updates within a time window are undoable. Standard file servers and DBMS servers can enjoy...
Organisations that follow the CMM-road towards software process improvement tend to spend large amounts of money and effort. This is certainly the case in the company ING which le...
Rob J. Kusters, Jos J. M. Trienekens, Wilmar Hasso...
From an ecological but also from an economical and in the meantime a technical view the fast ongoing increase of power consumption in today’s data centers is no longer feasible....