Sciweavers

5123 search results - page 138 / 1025
» Performance and Security Tradeoff
Sort
View
LCN
2000
IEEE
15 years 9 months ago
Performance Impact of Data Compression on Virtual Private Network Transactions
Virtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security servic...
John Patrick McGregor, Ruby B. Lee
WSC
2008
15 years 7 months ago
Clarifying CONWIP versus push system behavior using simulation
This research examines the performance of CONWIP versus "push" workload control in a simple, balanced manufacturing flowline. Analytical models and simulation experiment...
S. T. Enns, Paul Rogers
TWC
2008
106views more  TWC 2008»
15 years 4 months ago
Analysis of Handoff Interference and Outage along Arbitrary Trajectories in Cellular Networks
We introduce a new system performance measure due to handoff called handoff interference, which characterizes the additional interference noise induced by the handoff process. The ...
A. Leu, B. Mark, S. Tang
IPCCC
2006
IEEE
15 years 10 months ago
SHARP: a new real-time scheduling algorithm to improve security of parallel applications on heterogeneous clusters
This paper addresses the problem of improving quality of security for real-time parallel applications on heterogeneous clusters. We propose a new security- and heterogeneity-drive...
Tao Xie 0004, Xiao Qin, Mais Nijim
CCS
2001
ACM
15 years 9 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé