Sciweavers

308 search results - page 43 / 62
» On implementing security at the transport layer
Sort
View
ISCA
2010
IEEE
192views Hardware» more  ISCA 2010»
15 years 2 months ago
NoHype: virtualized cloud infrastructure without the virtualization
Cloud computing is a disruptive trend that is changing the way we use computers. The key underlying technology in cloud infrastructures is virtualization – so much so that many ...
Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby ...
ISORC
1999
IEEE
15 years 1 months ago
An Object-level Gateway Supporting Integrated-Property Quality of Service
As networks and the use of communication within applications continue to grow and find more uses, so too does the demand for more control and manageability of various "system...
Richard E. Schantz, John A. Zinky, David A. Karr, ...
ICNP
1998
IEEE
15 years 1 months ago
A Class of End-to-End Congestion Control Algorithms for the Internet
We formulate end-to-end congestion control as a global optimization problem. Based on this formulation, a class of minimum cost flow control (MCFC) algorithms for adjusting sessio...
S. Jamaloddin Golestani, S. Bhattacharyya
EGOV
2007
Springer
15 years 3 months ago
A Trust-Centered Approach for Building E-Voting Systems
eVoting is a challenging approach for increasing eParticipation. However, lack of citizens’ trust seems to be a main obstacle that hinders its successful realization. In this pap...
Athanasios Antoniou, C. Korakas, Christos Manolopo...
COMGEO
2010
ACM
15 years 24 days ago
Access control systems for spatial data infrastructures and their administration
Today sophisticated concepts, languages and frameworks exist, that allow implementing powerful fine grained access control systems for protecting Web Services and spatial data in ...
Jan Herrmann