Sciweavers

289 search results - page 57 / 58
» File Sharing Using IP-Multicast
Sort
View
ICPPW
2005
IEEE
13 years 11 months ago
Content Oriented Communications for Emergencies in Wireless Environments
In the conventional WWW search or P2P file sharing systems, users search for some information by using the Explicit Information such as keywords, addresses or content names. Howev...
Kazuya Sakai, Hiroki Nakano, Akiko Nakaniwa, Hiroy...
NDSS
2003
IEEE
13 years 11 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
FTDCS
2004
IEEE
13 years 9 months ago
The vMatrix: Server Switching
Today most Internet services are pre-assigned to servers statically, hence preventing us from doing real-time sharing of a pool of servers across as group of services with dynamic...
Amr Awadallah, Mendel Rosenblum
USENIX
2008
13 years 8 months ago
Idle Read After Write - IRAW
Despite a low occurrence rate, silent data corruption represents a growing concern for storage systems designers. Throughout the storage hierarchy, from the file system down to th...
Alma Riska, Erik Riedel
BMCBI
2007
109views more  BMCBI 2007»
13 years 5 months ago
Seahawk: moving beyond HTML in Web-based bioinformatics analysis
Background: Traditional HTML interfaces for input to and output from Bioinformatics analysis on the Web are highly variable in style, content and data formats. Combining multiple ...
Paul M. K. Gordon, Christoph W. Sensen