Sciweavers

2226 search results - page 437 / 446
» Scalable Trigger Processing
Sort
View
92
Voted
TPDS
2008
116views more  TPDS 2008»
14 years 9 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
CCR
2004
63views more  CCR 2004»
14 years 9 months ago
QoS-aware multicasting in DiffServ domains
Although many QoS-based multicast routing protocols have been proposed in recent years, most of them are based on per-flow resource reservation, which cannot be deployed within dif...
Zhi Li, Prasant Mohapatra
CCR
2004
95views more  CCR 2004»
14 years 9 months ago
A Per-Domain Behavior for circuit emulation in IP networks
Circuit networks are expensive to build, difficult to operate, fragile, and not easily scalable. Many network operators would like to carry circuit traffic as an overlay on top of...
Kathleen M. Nichols, Van Jacobson, Kedarnath Podur...
ET
2002
115views more  ET 2002»
14 years 9 months ago
CAS-BUS: A Test Access Mechanism and a Toolbox Environment for Core-Based System Chip Testing
As System on a Chip (SoC) testing faces new challenges, some new test architectures must be developed. This paper describes a Test Access Mechanism (TAM) named CASBUS that solves ...
Mounir Benabdenbi, Walid Maroufi, Meryem Marzouki
VLDB
2002
ACM
161views Database» more  VLDB 2002»
14 years 9 months ago
XMark: A Benchmark for XML Data Management
While standardization efforts for XML query languages have been progressing, researchers and users increasingly focus on the database technology that has to deliver on the new cha...
Albrecht Schmidt 0002, Florian Waas, Martin L. Ker...