Sciweavers

1314 search results - page 75 / 263
» New Approaches for Virtual Private Network Design
Sort
View
NDSS
2002
IEEE
15 years 6 months ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...
CLUSTER
2008
IEEE
15 years 8 months ago
Magnet: A novel scheduling policy for power reduction in cluster with virtual machines
—The concept of green computing has attracted much attention recently in cluster computing. However, previous local approaches focused on saving the energy cost of the components...
Liting Hu, Hai Jin, Xiaofei Liao, Xianjie Xiong, H...
CCGRID
2004
IEEE
15 years 5 months ago
Protection mechanisms for application service hosting platforms
The Application Service Hosting Platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared highperformance infrastructur...
Xuxian Jiang, Dongyan Xu, Rudolf Eigenmann
COMCOM
2007
125views more  COMCOM 2007»
15 years 1 months ago
Guaranteeing the network lifetime in wireless sensor networks: A MAC layer approach
Energy is the most crucial but scarce resource in wireless sensor networks (WSNs). A wealth of MAC protocols are proposed only to prolong the network lifetime for energy-efficienc...
Yongsub Nam, Taekyoung Kwon, Hojin Lee, Hakyung Ju...
WSC
2000
15 years 3 months ago
Simulation based design for a shipyard manufacturing process
Discrete event simulation can be used for virtual prototyping of new manufacturing facilities. Models built for this purpose must be easy to use, flexible, and provide a realistic...
Deborah J. Medeiros, Mark T. Traband, April Tribbl...