Sciweavers

596 search results - page 67 / 120
» Scalable security for large, high performance storage system...
Sort
View
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 3 months ago
Hierarchical and Breathing Peer-to-Peer SIP System
—The combination of the SIP-based service and Peer-to-Peer (P2P) can improve the performance of traditional client-server SIP system. However, current P2P SIP systems have many d...
Lifeng Le, Geng-Sheng Kuo
TC
2008
13 years 8 months ago
Elliptic-Curve-Based Security Processor for RFID
RFID (Radio Frequency IDentification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, to provide privacy, authenticat...
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid ...
P2P
2005
IEEE
14 years 2 months ago
Video Management in Peer-to-Peer Systems
Providing scalable video services in a peer-to-peer (P2P) environment is challenging. Since videos are typically large and require high communication bandwidth for delivery, many ...
Ying Cai, Zhan Chen, Wallapak Tavanapong
ISF
2008
114views more  ISF 2008»
13 years 8 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
IPPS
2002
IEEE
14 years 1 months ago
A Parallel Two-Level Hybrid Method for Diagonal Dominant Tridiagonal Systems
A new method, namely the Parallel Two-Level Hybrid (PTH) method, is developed to solve tridiagonal systems on parallel computers. PTH is designed based on Parallel Diagonal Domina...
Xian-He Sun, Wu Zhang