Sciweavers

2392 search results - page 96 / 479
» Channel-Hopping Multiple Access
Sort
View
HPDC
1998
IEEE
15 years 2 months ago
Authorization for Metacomputing Applications
One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved ...
G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman
HPCA
1995
IEEE
15 years 1 months ago
Program Balance and Its Impact on High Performance RISC Architectures
Information on the behavior of programs is essential for deciding the number and nature of functional units in high performance architectures. In this paper, we present studies on...
Lizy Kurian John, Vinod Reddy, Paul T. Hulina, Lee...
IWMMDBMS
1998
92views more  IWMMDBMS 1998»
14 years 11 months ago
Version Management and Recoverability for Large Object Data
Most applications that access large data objects do so through file systems, but file systems provide an incomplete solution, as they maintain insufficient metadata and do not pro...
Randal C. Burns, Inderpal Narang
ISI
2006
Springer
14 years 10 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
FGCS
2007
90views more  FGCS 2007»
14 years 10 months ago
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Grid computing is a newly developed technology for complex systems with large-scale resource sharing and multi-institutional collaboration. The prominent feature of grid computing...
Xukai Zou, Yuan-Shun Dai, Xiang Ran