Sciweavers

1855 search results - page 325 / 371
» System Consequence
Sort
View
MMSEC
2004
ACM
104views Multimedia» more  MMSEC 2004»
14 years 3 months ago
Key-assignment strategies for CPPM
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and its key management could easily be broken. A new ...
André Adelsbach, Jörg Schwenk
MOBICOM
2004
ACM
14 years 3 months ago
End-to-end performance and fairness in multihop wireless backhaul networks
Wireless IEEE 802.11 networks in residences, small businesses, and public “hot spots” typically encounter the wireline access link (DSL, cable modem, T1, etc.) as the slowest ...
Violeta Gambiroza, Bahareh Sadeghi, Edward W. Knig...
SAC
2004
ACM
14 years 3 months ago
A method to define an Enterprise Architecture using the Zachman Framework
The proliferation of IT and its consequent dispersion is an enterprise reality, however, most organizations do not have adequate tools and/or methodologies that enable the managem...
Carla Marques Pereira, Pedro Sousa
SIGCOMM
2004
ACM
14 years 3 months ago
Sizing router buffers
All Internet routers contain buffers to hold packets during times of congestion. Today, the size of the buffers is determined by the dynamics of TCP’s congestion control algor...
Guido Appenzeller, Isaac Keslassy, Nick McKeown
ICWE
2004
Springer
14 years 3 months ago
WebRatio, an Innovative Technology for Web Application Development
A data–intensive Web application is a Web-enabled software system for the publication and management of large data collections, typically stored in one or more database manageme...
Roberto Acerbis, Aldo Bongio, Stefano Butti, Stefa...