Sciweavers

3053 search results - page 209 / 611
» Performance of Generative Programming Based Protocol Impleme...
Sort
View
CCS
2010
ACM
13 years 7 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
JPDC
2006
112views more  JPDC 2006»
13 years 10 months ago
CEFT: A cost-effective, fault-tolerant parallel virtual file system
The vulnerability of computer nodes due to component failures is a critical issue for cluster-based file systems. This paper studies the development and deployment of mirroring in...
Yifeng Zhu, Hong Jiang
CBMS
2004
IEEE
14 years 2 months ago
Partial Shape Matching of Spine X-Ray Shapes Using Dynamic Programming
The osteophyte shows only on some particular locations on the vertebra. This indicates that other locations on the vertebra shape contain that are not of interest hinder the spine...
Xiaoqian Xu, D. J. Lee, Sameer Antani, L. Rodney L...
WSC
2004
14 years 4 days ago
Simulation Model of the Telemedicine Program
The Telemedicine Program was created to provide medical assistance to people living in extreme poverty conditions in Mexico. Through a satellite connection, a physician located in...
Juan Mauricio Lach, Ricardo Manuel Vázquez
WWW
2002
ACM
14 years 11 months ago
A web-based resource migration protocol using WebDAV
The web's hyperlinks are notoriously brittle, and break whenever a resource migrates. One solution to this problem is a transparent resource migration mechanism, which separa...
Michael P. Evans, Steven Furnell