Sciweavers

867 search results - page 112 / 174
» SQL Server 2005
Sort
View
110
Voted
IWSEC
2007
Springer
15 years 8 months ago
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for cl...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
119
Voted
AINA
2005
IEEE
15 years 8 months ago
Throughput Driven, Highly Available Streaming Stored Playback Video Service over a Peer-to-Peer Network
Streaming video is a key functionality in Internet based services such as distant education, VoD etc.,. The high bandwidth requirements associated with such applications coupled w...
K. Kalapriya, S. K. Nandy
ICPP
2005
IEEE
15 years 8 months ago
Exploring Processor Design Options for Java-Based Middleware
Java-based middleware is a rapidly growing workload for high-end server processors, particularly Chip Multiprocessors (CMP). To help architects design future microprocessors to ru...
Martin Karlsson, Erik Hagersten, Kevin E. Moore, D...
118
Voted
ISCC
2005
IEEE
15 years 8 months ago
Optimizing the Reliable Distribution of Large Files within CDNs
Abstract Content Delivery Networks (CDNs) provide an efficient support for serving http and streaming media content while minimizing the network impact of content delivery as well...
Ludmila Cherkasova
STORAGESS
2005
ACM
15 years 8 months ago
Secure capabilities for a petabyte-scale object-based distributed file system
Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed...
Christopher Olson, Ethan L. Miller