Sciweavers

2632 search results - page 134 / 527
» Management Issues in Eda
Sort
View
LCTRTS
2005
Springer
15 years 9 months ago
Upper bound for defragmenting buddy heaps
Knuth’s buddy system is an attractive algorithm for managing storage allocation, and it can be made to operate in real-time. At some point, storage-management systems must eithe...
Delvin C. Defoe, Sharath R. Cholleti, Ron Cytron
EUROPKI
2007
Springer
15 years 8 months ago
OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules
Abstract. The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need ass...
Jean Everson Martina, Túlio Cicero Salvaro ...
ITSSA
2006
132views more  ITSSA 2006»
15 years 4 months ago
A Self-Governance Approach to Supporting Privacy Preference-based Content Sharing
: The increase in the creation and sharing of distributed multimedia content has led to the creation of new tools and methods to automatically and manually annotate content to assi...
Patricia Charlton, Jonathan Teh
SIGMOD
2005
ACM
141views Database» more  SIGMOD 2005»
16 years 4 months ago
XML database support for distributed execution of data-intensive scientific workflows
In this paper we look at the application of XML data management support in scientific data analysis workflows. We describe a software infrastructure that aims to address issues as...
Shannon Hastings, Matheus Ribeiro, Stephen Langell...
123
Voted
CN
2004
115views more  CN 2004»
15 years 4 months ago
Bandwidth provisioning and pricing for networks with multiple classes of service
Network service providers purchase large point-to-point connections from network owners, then offer individual users network access at a price. Appropriately provisioning (purchas...
Errin W. Fulp, Douglas S. Reeves