Sciweavers

175 search results - page 25 / 35
» Password policy simulation and analysis
Sort
View
HICSS
2005
IEEE
145views Biometrics» more  HICSS 2005»
14 years 2 months ago
Offshore Outsourcing: Counteracting Forces and Their Dynamic Effects
Many argue that offshoring is an inexorable trend since IT skills have become a global commodity and they are vastly cheaper in other parts of the world. According to this view, m...
Amitava Dutta, Rahul Roy
ASIASIM
2004
Springer
14 years 2 months ago
Design and Implementation of an SSL Component Based on CBD
Abstract. SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerabl...
Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwo...
LCN
1998
IEEE
14 years 1 months ago
Providing Rate Guarantees to TCP over the ATM GFR Service
The ATM Guaranteed Frame Rate GFR service is intended for best e ort tra c that can bene t from minimum throughput guarantees. Edge devices connecting LANs to an ATM network can u...
Rohit Goyal, Raj Jain, Sonia Fahmy, Bobby Vandalor...
PODC
1994
ACM
14 years 1 months ago
A Performance Evaluation of Lock-Free Synchronization Protocols
In this paper, we investigate the practical performance of lock-free techniques that provide synchronization on shared-memory multiprocessors. Our goal is to provide a technique t...
Anthony LaMarca
CAS
2004
112views more  CAS 2004»
13 years 8 months ago
Sustainable Urban Transportation: A Model-Based Approach
Transportation and its environmental impacts are a major component of urban environmental management. At the same time, transportation and mobility are an important part or urban ...
Kurt Fedra