Sciweavers

13457 search results - page 2644 / 2692
» Design and Development of the Long-Jumping
Sort
View
CIDR
2003
164views Algorithms» more  CIDR 2003»
14 years 11 months ago
Capacity Bound-free Web Warehouse
Web cache technologies have been developed as an extension of CPU cache, by modifying LRU (Least Recently Used) algorithms. Actually in web cache systems, we can use disks and ter...
Yahiko Kambayashi, Kai Cheng
EUNIS
2001
14 years 11 months ago
The influence of the Information System on administrative processes at the University of Latvia
: The goal of this paper is to describe how the development, implementation, and deployment of Information System of University of Latvia changed the life of the University and fac...
Janis Stonis, Laila Niedrite, Aivars Niedritis
CMS
2003
171views Communications» more  CMS 2003»
14 years 11 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
CSREASAM
2003
14 years 11 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
DGO
2003
133views Education» more  DGO 2003»
14 years 11 months ago
Accessing Diverse Geo-Referenced Data Sources with the SAND Spatial DBMS
The Internet has become the most frequently accessed medium for obtaining various types of data. In particular, government agencies, academic institutions, and private enterprises...
Jagan Sankaranarayanan, Egemen Tanin, Hanan Samet,...
« Prev « First page 2644 / 2692 Last » Next »