Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, such as Internet banking. SSL/TLS session-aware user authentication can be used to ...
The problem of enabling scientist users to submit jobs to grid computing environments will eventually limit the usability of grids. The eMinerals project has tackled this problem ...
Richard P. Bruin, Toby O. H. White, Andrew M. Walk...
Query optimization is an inherently complex problem, and validating the correctness and effectiveness of a query optimizer can be a task of comparable complexity. The overall proc...
Database administrators struggle when managing workloads that have widely different performance requirements. For example, the same database may support short-running OLTP queries...
Stefan Krompass, Andreas Scholz, Martina-Cezara Al...
This paper describes the basic concepts of error diagnostics and an associated rule system whose application helps to identify potential hardware/software locations of errors whic...