Sciweavers

3378 search results - page 614 / 676
» A universe of binding and computation
Sort
View
CLUSTER
2000
IEEE
15 years 2 months ago
Partition Repositories for Partition Cloning - OS Independent Software Maintenance in Large Clusters of PCs
As a novel approach to software maintenance in large clusters of PCs requiring multiple OS installations we implemented partition cloning and partition repositories as well as a s...
Felix Rauch, Christian Kurmann, Thomas Stricker
LCN
2000
IEEE
15 years 2 months ago
On Integrating Differentiated Services and UMTS Networks
Differentiated Services (DS) is currently the major approach discussed to provide network layer service differentiation in IP networks. However, the discussion mainly addresses ï¬...
Jörg Diederich, Thorsten Lohmar, Martina Zitt...
NDSS
2000
IEEE
15 years 2 months ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song
ADBIS
2000
Springer
188views Database» more  ADBIS 2000»
15 years 2 months ago
Algorithms for Rewriting Aggregate Queries Using Views
Queries involving aggregation are typical in a number of database research areas, such as data warehousing, global information systems and mobile computing. One of the main ideas ...
Sara Cohen, Werner Nutt, Alexander Serebrenik
ICCAD
1999
IEEE
66views Hardware» more  ICCAD 1999»
15 years 2 months ago
Timing-safe false path removal for combinational modules
A delay abstraction of a combinational module is a compact representation of the delay information of the module, which carries effective pin-to-pin delay for each primary-input/pr...
Yuji Kukimoto, Robert K. Brayton