Sciweavers

680 search results - page 84 / 136
» Locating Hidden Servers
Sort
View
TC
1998
14 years 9 months ago
Resilient Authentication Using Path Independence
—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distribut...
Michael K. Reiter, Stuart G. Stubblebine
IOR
2010
86views more  IOR 2010»
14 years 8 months ago
Disjunctive Decomposition for Two-Stage Stochastic Mixed-Binary Programs with Random Recourse
This paper introduces disjunctive decomposition for two-stage mixed 0-1 stochastic integer programs (SIPs) with random recourse. Disjunctive decomposition allows for cutting plane...
Lewis Ntaimo
IC
2010
14 years 7 months ago
Distributed Algorithms for the Placement of Network Services
Network services play an important role in the Internet today. They serve as data caches for websites, servers for multiplayer games and relay nodes for Voice over IP (VoIP) conver...
Todd Sproull, Roger Chamberlain
IJDSST
2010
163views more  IJDSST 2010»
14 years 7 months ago
User's Behaviour inside a Digital Library
Abstract: CASPUR allows many academic Italian institutions located in the CentreSouth of Italy to access more than 7 million of articles through a digital library platform. We anal...
Marco Scarnò
ICDE
2002
IEEE
116views Database» more  ICDE 2002»
15 years 11 months ago
SCADDAR: An Efficient Randomized Technique to Reorganize Continuous Media Blocks
Scalable storage architectures allow for the addition of disks to increase storage capacity and/or bandwidth. In its general form, disk scaling also refers to disk removals when e...
Ashish Goel, Cyrus Shahabi, Shu-Yuen Didi Yao, Rog...