Sciweavers

978 search results - page 73 / 196
» A performance study of job management systems
Sort
View
IJISEC
2002
86views more  IJISEC 2002»
14 years 11 months ago
Using AVL trees for fault-tolerant group key management
In this paper we describe an efficient algorithm for the management of group-keys for Group Communication Systems. Our algorithm is based on the notion of key-graphs, previously u...
Ohad Rodeh, Kenneth P. Birman, Danny Dolev
SIGUCCS
2003
ACM
15 years 5 months ago
What's old is new again: training is the information technology constant
This paper is an account of some of the more instructive experiences we gained as we sought to ensure that our information technology training programs kept pace with a fast chang...
George Bradford
CIKM
2000
Springer
15 years 4 months ago
A Framework for Modeling Buffer Replacement Strategies
An e ective bu er management system is crucial for any database management system. While much work has been expended to provide extensible data types,extensible query languages an...
Stéphane Bressan, Chong Leng Goh, Beng Chin...
HICSS
1998
IEEE
104views Biometrics» more  HICSS 1998»
15 years 4 months ago
Managing Metadata for Distributed Information Servers
In this paper we present the design and implementation of a distributed index architecture to facilitate metadata discovery on large networks. Many current information discovery s...
Nigel Hinds, Chinya V. Ravishankar
JDCTA
2010
172views more  JDCTA 2010»
14 years 6 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh