Sciweavers

779 search results - page 111 / 156
» Towards an Integrated Model for Data, Metadata, and Operatio...
Sort
View
LCN
2000
IEEE
14 years 1 months ago
Performance Impact of Data Compression on Virtual Private Network Transactions
Virtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security servic...
John Patrick McGregor, Ruby B. Lee
STEP
2003
IEEE
14 years 2 months ago
Using Grid Technologies for Web-Enabling Legacy Systems
The adoption of the Internet technologies favors the diffusion of Web and Grid-based applications. However, the development of new applications exploiting the modern interfaces an...
Thierry Bodhuin, Maria Tortorella
SIGCOMM
2010
ACM
13 years 9 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
JCDL
2010
ACM
184views Education» more  JCDL 2010»
14 years 2 months ago
Evaluating topic models for digital libraries
Topic models could have a huge impact on improving the ways users find and discover content in digital libraries and search interfaces, through their ability to automatically lea...
David Newman, Youn Noh, Edmund M. Talley, Sarvnaz ...
IFIP
1993
Springer
14 years 1 months ago
Customization and Evolution of Process Models in EPOS
EPOS is a kernel software engineering environment, o ering integrated software con guration and process management. The EPOS process modeling PM support system runs on top of th...
Reidar Conradi, Maria Letizia Jaccheri