Sciweavers

554 search results - page 65 / 111
» Smart Redundancy for Distributed Computation
Sort
View
IJNSEC
2008
145views more  IJNSEC 2008»
13 years 10 months ago
Efficient User Authentication and Key Agreement with User Privacy Protection
Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to use...
Wen-Shenq Juang, Jing-Lin Wu
EDBT
2008
ACM
161views Database» more  EDBT 2008»
14 years 10 months ago
Load distribution of analytical query workloads for database cluster architectures
Enterprises may have multiple database systems spread across the organization for redundancy or for serving different applications. In such systems, query workloads can be distrib...
Thomas Phan, Wen-Syan Li
TOOLS
2010
IEEE
13 years 7 months ago
Visualizing Dynamic Metrics with Profiling Blueprints
While traditional approaches to code profiling help locate performance bottlenecks, they offer only limited support for removing these bottlenecks. The main reason is the lack of v...
Alexandre Bergel, Romain Robbes, Walter Binder
MM
2005
ACM
179views Multimedia» more  MM 2005»
14 years 3 months ago
rStream: resilient peer-to-peer streaming with rateless codes
The inherent instability and unreliability of peer-to-peer networks introduce several fundamental engineering challenges to multimedia streaming over peer-to-peer networks. First,...
Chuan Wu, Baochun Li
EMSOFT
2004
Springer
14 years 3 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter