— By monitoring the exchanged IPsec traffic an adversary can usually easily discover the layout of virtual private networks (VPNs). Of even worse extend is the disclosure if com...
Michael Brinkmeier, Michael Rossberg, Guenter Scha...
There are a growing number of Information Communication Technology (ICT) applications in cultural heritage. However despite funding constraints, projects often involve similar or ...
This paper describes the design and implementation of a gigabit ATM switching system supporting link rates from 150 Mb/s to 2.4 Gb/s, with a uniquely e cient multicastswitch archi...
Thomas J. Chaney, J. Andrew Fingerhut, Margaret Fl...
The MR Toolkit Peer Package is an extension to the MR Toolkit that allows multiple independent MR Toolkit applications to communicate with one another across the Internet. The mas...
This paper describes \Object Group", an object behavioral pattern for group communication and fault-tolerance in distributed systems. The Object Group pattern supports the im...