Sciweavers

537 search results - page 10 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
PADL
2009
Springer
15 years 10 months ago
Declarative Network Verification
Abstract. In this paper, we present our initial design and implementation of a declarative network verifier (DNV). DNV utilizes theorem proving, a well established verification tec...
Anduo Wang, Prithwish Basu, Boon Thau Loo, Oleg So...
ICWS
2007
IEEE
14 years 11 months ago
Comparing Web Services with other Software Components
Software metrics is vital for the management of software development, especially when a new technology is adopted and established practices have yet to be developed. As a kind of s...
Yijun Yu, Jianguo Lu, Juan Fernández-Ramil,...
LCN
2000
IEEE
15 years 2 months ago
Performance Impact of Data Compression on Virtual Private Network Transactions
Virtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security servic...
John Patrick McGregor, Ruby B. Lee
ECRTS
2005
IEEE
15 years 3 months ago
A Space-Optimal Wait-Free Real-Time Synchronization Protocol
We present a wait-free protocol for the single-writer, multiple-reader problem in small-memory, embedded real-time systems. We analytically establish that our protocol requires le...
Hyeonjoong Cho, Binoy Ravindran, E. Douglas Jensen
BMCBI
2008
111views more  BMCBI 2008»
14 years 10 months ago
Comparative optimism in models involving both classical clinical and gene expression information
Background: In cancer research, most clinical variables have already been investigated and are now well established. The use of transcriptomic variables has raised two problems: r...
Caroline Truntzer, Delphine Maucort-Boulch, Pascal...