Sciweavers

20024 search results - page 3869 / 4005
» Database Management Systems
Sort
View
CCS
2001
ACM
15 years 2 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
CCS
2001
ACM
15 years 2 months ago
Taking the Copy Out of Copyright
Under current U.S. law and common understanding, the fundamental right granted by copyright is the right of reproduction – of making copies. Indeed, the very word “copyright”...
Ernest Miller, Joan Feigenbaum
ACSAC
2000
IEEE
15 years 2 months ago
Enabling Secure On-Line DNS Dynamic Update
Domain Name System (DNS) is the system for the mapping between easily memorizable host names and their IP addresses. Due to its criticality, security extensions to DNS have been p...
Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine
ISCA
2000
IEEE
107views Hardware» more  ISCA 2000»
15 years 2 months ago
A fully associative software-managed cache design
As DRAM access latencies approach a thousand instructionexecution times and on-chip caches grow to multiple megabytes, it is not clear that conventional cache structures continue ...
Erik G. Hallnor, Steven K. Reinhardt
ACMDIS
2000
ACM
15 years 2 months ago
Contextual Prototyping of User Interfaces
Contextual development differs from traditional user interface development in several ways: It focuses on the context of usage and the user population rather than on the technical...
Christian Stary
« Prev « First page 3869 / 4005 Last » Next »