Sciweavers

3733 search results - page 674 / 747
» Performance Evaluation of an Operating System Transaction Ma...
Sort
View
134
Voted
IJBC
2006
93views more  IJBC 2006»
15 years 4 months ago
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of featur...
Gonzalo Álvarez, Shujun Li
JHSN
2006
95views more  JHSN 2006»
15 years 4 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
SIGMOD
2008
ACM
127views Database» more  SIGMOD 2008»
15 years 4 months ago
Minimization of tree pattern queries with constraints
Tree pattern queries (TPQs) provide a natural and easy formalism to query tree-structured XML data, and the efficient processing of such queries has attracted a lot of attention. ...
Ding Chen, Chee Yong Chan
SIGMETRICS
2010
ACM
180views Hardware» more  SIGMETRICS 2010»
15 years 2 months ago
Route oracle: where have all the packets gone?
Many network-management problems in large backbone networks need the answer to a seemingly simple question: where does a given IP packet, entering the network at a particular plac...
Yaping Zhu, Jennifer Rexford, Subhabrata Sen, Aman...
IPPS
2010
IEEE
15 years 2 months ago
Reconciling scratch space consumption, exposure, and volatility to achieve timely staging of job input data
Innovative scientific applications and emerging dense data sources are creating a data deluge for highend computing systems. Processing such large input data typically involves cop...
Henry M. Monti, Ali Raza Butt, Sudharshan S. Vazhk...