Sciweavers

200 search results - page 2 / 40
» Replicating and Sharing Computer Security Laboratory Environ...
Sort
View
COMCOM
2008
138views more  COMCOM 2008»
13 years 5 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
ISMIR
2004
Springer
176views Music» more  ISMIR 2004»
13 years 11 months ago
The International Music Information Retrieval Systems Evaluation Laboratory: Governance, Access and Security
The IMIRSEL (International Music Information Retrieval Systems Evaluation Laboratory) project provides an unprecedented platform for evaluating Music Information Retrieval (MIR) a...
J. Stephen Downie, Joe Futrelle, David K. Tcheng
SIGCSE
2010
ACM
183views Education» more  SIGCSE 2010»
14 years 8 days ago
Electronic commerce virtual laboratory
Website security is essential for successful e-commerce ventures, but the vital “how-to” components of security are often lacking in academic courses. This paper describes our...
Joel Coffman, Alfred C. Weaver
JBI
2010
212views Bioinformatics» more  JBI 2010»
13 years 17 days ago
Cloud computing: A new business paradigm for biomedical information sharing
We examine how the biomedical informatics (BMI) community, especially consortia that share data and applications, can take advantage of a new resource called cloud computing. Clou...
Arnon Rosenthal, Peter Mork, Maya Hao Li, Jean Sta...
COLCOM
2009
IEEE
13 years 10 months ago
DiSK: A distributed shared disk cache for HPC environments
Abstract—Data movement within high performance environments can be a large bottleneck to the overall performance of programs. With the addition of continuous storage and usage of...
Brandon Szeliga, Tung Nguyen, Weisong Shi