Sciweavers

485 search results - page 76 / 97
» Operational requirements for scalable search systems
Sort
View
CCR
2006
108views more  CCR 2006»
14 years 9 months ago
Counting 6to4 relay routers
6to4 is a mechanism for providing IPv6 addresses and connectivity where native IPv6 is not available. In 6to4, the links between the IPv4 and IPv6 Internets are called relay route...
David Malone
CORR
2006
Springer
136views Education» more  CORR 2006»
14 years 9 months ago
A Case for Peering of Content Delivery Networks
: The proliferation of Content Delivery Networks (CDN) reveals that existing content networks are owned and operated by individual companies. As a consequence, closed delivery netw...
Rajkumar Buyya, Al-Mukaddim Khan Pathan, James Bro...
CN
2007
172views more  CN 2007»
14 years 9 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
ISCA
2008
IEEE
136views Hardware» more  ISCA 2008»
14 years 9 months ago
The Design and Performance of a Bare PC Web Server
There is an increasing need for new Web server architectures that are application-centric, simple, small, and pervasive in nature. In this paper, we present a novel architecture f...
Long He, Ramesh K. Karne, Alexander L. Wijesinha
TC
2008
14 years 9 months ago
Elliptic-Curve-Based Security Processor for RFID
RFID (Radio Frequency IDentification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, to provide privacy, authenticat...
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid ...