Sciweavers

54 search results - page 9 / 11
» On Generating the Initial Key in the Bounded-Storage Model
Sort
View
PDPTA
2003
13 years 9 months ago
Dependability Prediction of High Availability OSCAR Cluster Server
High availability (HA) computing has recently gained much attention, especially in enterprise and mission critical systems. The HA is now a necessity that is no longer regarded as...
Chokchai Leangsuksun, Lixin Shen, Tong Liu, Herton...
IJHPCA
2002
101views more  IJHPCA 2002»
13 years 7 months ago
SCALA: A Performance System For Scalable Computing
Lack of effective performance-evaluation environments is a major barrier to the broader use of high performance computing. Conventional performance environments are based on profi...
Xian-He Sun, Thomas Fahringer, Mario Pantano
PAMI
2011
13 years 2 months ago
Bilayer Segmentation of Webcam Videos Using Tree-Based Classifiers
—This paper presents an automatic segmentation algorithm for video frames captured by a (monocular) webcam that closely approximates depth segmentation from a stereo camera. The ...
Pei Yin, Antonio Criminisi, John M. Winn, Irfan A....
ECIS
2001
13 years 9 months ago
Barriers to effective knowledge management: Action Research Meets Grounded Theory
Despite evidence that the majority of knowledge management (KM) initiatives miscarry, there has been a paucity of critical, in-depth research into the causes of failure. In this p...
David Graham Wastell
CN
2004
122views more  CN 2004»
13 years 7 months ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee