Sciweavers

13 search results - page 2 / 3
» Data path credentials for high-performance capabilities-base...
Sort
View
ANCS
2007
ACM
13 years 10 months ago
Design of a network architecture with inherent data path security
Next-generation Internet architectures require designs with inherent security guarantees. We present a network architecture that uses credentials to audit traffic in the data path...
Tilman Wolf
HICSS
2007
IEEE
91views Biometrics» more  HICSS 2007»
14 years 17 days ago
Immigrants and the Job Search: Comparing the Internet to Other Paths to Jobs
Highly educated immigrants face many barriers to employment in Canada, especially in acquiring jobs at the same level as those they had held prior to migration. This exploratory s...
Arent Greve, Janet W. Salaff, Elic Chan
IWAN
2001
Springer
13 years 10 months ago
Deploying an Active Voice Application on a Three-Level Active Network Node Architecture
Active networks have been recently highlighted as a key enabling technology to obtain immense flexibility in terms of network deployment, configurability, and customized packet pro...
Georg Carle, Henning Sanneck, Sebastian Zander, Lo...
EUROPDS
1997
13 years 7 months ago
A Combined Virtual Shared Memory and Network which Schedules
In this paper, we follow a new path to arrive at the idea of a COMA — a Cache Only Memory Architecture. We show how the evolution of another architecture (ADARC) leads quite nat...
Ronald Moore, Bernd Klauer, Klaus Waldschmidt
PVLDB
2010
122views more  PVLDB 2010»
13 years 4 months ago
On Graph Query Optimization in Large Networks
The dramatic proliferation of sophisticated networks has resulted in a growing need for supporting effective querying and mining methods over such large-scale graph-structured da...
Peixiang Zhao, Jiawei Han