Sciweavers

3637 search results - page 698 / 728
» Application of Network Calculus to Guaranteed Service Networ...
Sort
View
104
Voted
ISSA
2004
15 years 3 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche
119
Voted
SIROCCO
2000
15 years 3 months ago
Cooperative computing with fragmentable and mergeable groups
ABSTRACT: This work considers the problem of performing a set of N tasks on a set of P cooperating message-passing processors (P N). The processors use a group communication servi...
Chryssis Georgiou, Alexander A. Shvartsman
NAACL
1994
15 years 3 months ago
MACROPHONE: An American English Telephone Speech Corpus
Macrophone is a corpus of approximately 200,000 utterances, recorded over the telephone from a broad sample of about 5,000 American speakers. Sponsored by the Linguistic Data Cons...
Kelsey Taussig, Jared Bernstein
123
Voted
JCSS
2006
102views more  JCSS 2006»
15 years 1 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh
WWW
2008
ACM
15 years 1 months ago
KC3 browser: semantic mash-up and link-free browsing
This paper proposes a general framework of for a system with a semantic browsing and visualization interface called Knowledge Communication, Collaboration and Creation Browser (KC...
Michiaki Iwazume, Ken Kaneiwa, Koji Zettsu, Takafu...