Sciweavers

1401 search results - page 145 / 281
» NetCache Architecture and Deployment
Sort
View
JHSN
2006
95views more  JHSN 2006»
15 years 4 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
JTAER
2006
143views more  JTAER 2006»
15 years 4 months ago
P2P's Significance for eBusiness: Towards a Research Agenda
Applications running over peer-to-peer (P2P) networks have exploded since the late 1990s. Research is needed into many aspects of P2P. These include architecture, application func...
Roger Clarke
FGCS
2007
86views more  FGCS 2007»
15 years 4 months ago
A grid-based approach for enterprise-scale data mining
Abstract— We describe a grid-based approach for enterprisescale data mining that leverages database technology for I/O parallelism, and on-demand compute servers for compute para...
Ramesh Natarajan, Radu Sion, Thomas Phan
TC
2008
15 years 4 months ago
eRAID: Conserving Energy in Conventional Disk-Based RAID System
Recently, high-energy consumption has become a serious concern for both storage servers and data centers. Recent research studies have utilized the short transition times of multis...
Jun Wang, Huijun Zhu, Dong Li
ASE
2005
145views more  ASE 2005»
15 years 4 months ago
Developing Ambient Intelligence Systems: A Solution based on Web Services
Enabling the ambient intelligence vision means that consumers will be provided with universal and immediate access to available content and services, together with ways of effectiv...
Valérie Issarny, Daniele Sacchetti, Ferda T...