Sciweavers

54 search results - page 9 / 11
» On Generating the Initial Key in the Bounded-Storage Model
Sort
View
PDPTA
2003
14 years 10 months ago
Dependability Prediction of High Availability OSCAR Cluster Server
High availability (HA) computing has recently gained much attention, especially in enterprise and mission critical systems. The HA is now a necessity that is no longer regarded as...
Chokchai Leangsuksun, Lixin Shen, Tong Liu, Herton...
81
Voted
IJHPCA
2002
101views more  IJHPCA 2002»
14 years 9 months ago
SCALA: A Performance System For Scalable Computing
Lack of effective performance-evaluation environments is a major barrier to the broader use of high performance computing. Conventional performance environments are based on profi...
Xian-He Sun, Thomas Fahringer, Mario Pantano
PAMI
2011
14 years 4 months ago
Bilayer Segmentation of Webcam Videos Using Tree-Based Classifiers
—This paper presents an automatic segmentation algorithm for video frames captured by a (monocular) webcam that closely approximates depth segmentation from a stereo camera. The ...
Pei Yin, Antonio Criminisi, John M. Winn, Irfan A....
95
Voted
ECIS
2001
14 years 10 months ago
Barriers to effective knowledge management: Action Research Meets Grounded Theory
Despite evidence that the majority of knowledge management (KM) initiatives miscarry, there has been a paucity of critical, in-depth research into the causes of failure. In this p...
David Graham Wastell
CN
2004
122views more  CN 2004»
14 years 9 months ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee