Sciweavers

858 search results - page 140 / 172
» On the Salsa20 Core Function
Sort
View
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 9 months ago
Turning Cluster Management into Data Management: A System Overview
This paper introduces the CondorJ2 cluster management system. Traditionally, cluster management systems such as Condor employ a process-oriented approach with little or no use of ...
Eric Robinson, David J. DeWitt
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 9 months ago
Unmanaged Internet Protocol: Taming the Edge Network Management Crisis
Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarc...
Bryan Ford
EOR
2006
117views more  EOR 2006»
13 years 9 months ago
Heuristics for selecting robust database structures with dynamic query patterns
The success of a company increasingly depends on timely information (internal or external) being available to the right person at the right time for crucial managerial decision-ma...
Andrew N. K. Chen, Paulo B. Goes, Alok Gupta, Jame...
IJNSEC
2008
117views more  IJNSEC 2008»
13 years 9 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin
IJKL
2006
94views more  IJKL 2006»
13 years 9 months ago
Supporting teachers as content authors in intelligent educational systems
: Intelligent Educational Systems (IESs) need large amounts of educational content that is typically not provided by the creators of these systems. In this paper we discuss a new a...
Peter Brusilovsky, Judith Knapp, Johann Gamper