Sciweavers

1516 search results - page 280 / 304
» How Open is e-Science
Sort
View
CRYPTO
2000
Springer
136views Cryptology» more  CRYPTO 2000»
13 years 11 months ago
Long-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Juan A. Garay, Jessica Staddon, Avishai Wool
MSS
1999
IEEE
166views Hardware» more  MSS 1999»
13 years 11 months ago
A 64-bit, Shared Disk File System for Linux
In computer systems today, speed and responsiveness is often determined by network and storage subsystem performance. Faster, more scalable networking interfaces like Fibre Channe...
Kenneth W. Preslan, Andrew P. Barry, Jonathan Bras...
HPCA
1998
IEEE
13 years 11 months ago
Communication Across Fault-Containment Firewalls on the SGI Origin
Scalability and reliability are inseparable in high-performance computing. Fault-isolation through hardware is a popular means of providing reliability. Unfortunately, such isolat...
Kaushik Ghosh, Allan J. Christie
VLDB
1999
ACM
147views Database» more  VLDB 1999»
13 years 11 months ago
Data-Driven, One-To-One Web Site Generation for Data-Intensive Applications
A data-driven approach can be fruitfully used in the speci cation and automatic generation of data-intensive Web applications, i.e., applications which make large amounts of data ...
Stefano Ceri, Piero Fraternali, Stefano Paraboschi
SIGMOD
1997
ACM
166views Database» more  SIGMOD 1997»
13 years 11 months ago
The InfoSleuth Project
The goal of the InfoSleuth project at MCC is to exploit and synthesize new technologies into a uni ed system that retrieves and processes information in an ever-changing network o...
Roberto J. Bayardo Jr., William Bohrer, Richard S....