Sciweavers

5898 search results - page 228 / 1180
» Parallel Computing Environments and Methods
Sort
View
AUSFORENSICS
2004
15 years 4 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
PC
1998
132views Management» more  PC 1998»
15 years 2 months ago
Parallel Linear Congruential Generators with Prime Moduli
Linear congruential generators (LCGs) remain the most popular method of pseudorandom number generation on digital computers. Ease of implementation has favored implementing LCGs wi...
Michael Mascagni
CW
2005
IEEE
15 years 8 months ago
A Capability-Based Transparent Cryptographic File System
Data on the file system in mobile internetworked working environments are exposed data to a number of threats ranging from physical theft of storage devices to industrial espiona...
Frank Graf, Stephen D. Wolthusen
ICA3PP
2005
Springer
15 years 8 months ago
GridFTP and Parallel TCP Support in NaradaBrokering
Many of the key features of file transfer mechanisms like reliable file transferring and parallel transferring are developed as part of the service. It makes very hard to re-use th...
Sang Boem Lim, Geoffrey Fox, Ali Kaplan, Shrideep ...
APPT
2003
Springer
15 years 8 months ago
Optimal Broadcast Channel for Data Dissemination in Mobile Database Environment
The increase number of mobile users in wireless environment affects query access time substantially. To minimise the query access time, one possible way is to employ data broadcast...
Agustinus Borgy Waluyo, Bala Srinivasan, David Tan...