Sciweavers

217 search results - page 41 / 44
» Selecting Cryptographic Key Sizes
Sort
View
ESA
2005
Springer
113views Algorithms» more  ESA 2005»
14 years 1 months ago
Online View Maintenance Under a Response-Time Constraint
Abstract. A materialized view is a certain synopsis structure precomputed from one or more data sets (called base tables) in order to facilitate various queries on the data. When t...
Kamesh Munagala, Jun Yang 0001, Hai Yu
SIGCOMM
2004
ACM
14 years 1 months ago
Building a better NetFlow
Network operators need to determine the composition of the traffic mix on links when looking for dominant applications, users, or estimating traffic matrices. Cisco’s NetFlow ha...
Cristian Estan, Ken Keys, David Moore, George Varg...
CAISE
2004
Springer
14 years 1 months ago
MT-Flow - An Environment for Workflow-Supported Model Transformations in MDA
Abstract. Specification of systems in a software product line (product-line members) is often supported by domain-specific languages (DSLs) that provide pownguage abstractions for ...
Jernej Kovse, Theo Härder
ESA
2004
Springer
145views Algorithms» more  ESA 2004»
14 years 1 months ago
Flows on Few Paths: Algorithms and Lower Bounds
Abstract. Classical network flow theory allows decomposition of flow into several chunks of arbitrary sizes traveling through the network on different paths. In the first part ...
Maren Martens, Martin Skutella
IPPS
2003
IEEE
14 years 1 months ago
Constrained Component Deployment in Wide-Area Networks Using AI Planning Techniques
Component-based models represent a dominant trend in the construction of wide-area network applications, making possible the integration of diverse functionality contained in modu...
Tatiana Kichkaylo, Anca-Andreea Ivan, Vijay Karamc...