Sciweavers

5723 search results - page 1064 / 1145
» Managing the network
Sort
View
FC
2007
Springer
125views Cryptology» more  FC 2007»
15 years 7 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester
DEXAW
2006
IEEE
140views Database» more  DEXAW 2006»
15 years 6 months ago
String-Matching and Update through Algebraic Signatures in Scalable Distributed Data Structures
: Scalable Distributed Data Structures (SDDSs) store large scalable files over a distributed RAM of nodes in a grid or a P2P network. The files scale transparently for the applicat...
Riad Mokadem, Witold Litwin
VLSID
2006
IEEE
192views VLSI» more  VLSID 2006»
15 years 6 months ago
Beyond RTL: Advanced Digital System Design
This tutorial focuses on advanced techniques to cope with the complexity of designing modern digital chips which are complete systems often containing multiple processors, complex...
Shiv Tasker, Rishiyur S. Nikhil
CSCW
2006
ACM
15 years 6 months ago
A grounded theory of information sharing behavior in a personal learning space
This paper presents a grounded theory of information sharing behavior of the users of a personal learning space. A personal learning space is an environment consisted of weblog, e...
Maryam Najafian Razavi, Lee Iverson
SIGUCCS
2006
ACM
15 years 6 months ago
Because we have better things to do: automating common support tasks
As technology permeates more aspects of our everyday lives, greater demands are placed on information technology personnel. Lehigh University computing consultants have found thei...
Keith B. Erekson, Stephen G. Lewis
« Prev « First page 1064 / 1145 Last » Next »