Sciweavers

2139 search results - page 214 / 428
» Distributed computing and computer security education
Sort
View
129
Voted
CCS
2007
ACM
15 years 9 months ago
Incremental adaptation of XPath access control views
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee,...
152
Voted
ISHPC
1999
Springer
15 years 7 months ago
Integrity and Performance in Network Attached Storage
Computer security is of growing importance in the increasingly networked computing environment.This work examines the issue of high-performance network security, specifically int...
Howard Gobioff, David Nagle, Garth A. Gibson
HIPC
2009
Springer
15 years 1 months ago
Highly scalable algorithm for distributed real-time text indexing
Stream computing research is moving from terascale to petascale levels. It aims to rapidly analyze data as it streams in from many sources and make decisions with high speed and a...
Ankur Narang, Vikas Agarwal, Monu Kedia, Vijay K. ...
138
Voted
CORR
2011
Springer
150views Education» more  CORR 2011»
14 years 10 months ago
Optimal coding for the deletion channel with small deletion probability
The deletion channel is the simplest point-to-point communication channel that models lack of synchronization. Input bits are deleted independently with probability d, and when th...
Yashodhan Kanoria, Andrea Montanari
ICMCS
2006
IEEE
116views Multimedia» more  ICMCS 2006»
15 years 9 months ago
SIKAS: A Scalable Distributed Key Management Scheme for Dynamic Collaborative Groups
The increasing popularity of distributed and collaborative applications prompts the need for secure communication in collaborative groups. Some distributed collaborative key manag...
Jiang Zhang, Jian-Guang Luo, Bin Li, Shiqiang Yang