computer secuirety s2k 93 23
... Plan 7 Livermore Laboratory and currently licensed to General Atomics (GA), who op- erate the San Diego Supercomputer Center in partnership with the University of California. There are UniTree implementation ... benchmark is a scientific and engineering workload derived from a tracing study of the Cray supercomputer at the National Center for Atmospheric Research (NCAR) [Mill92]. The purpose o...
Ngày tải lên: 28/04/2014, 14:09
computer secuirety s2k 94 49
... Simha, R., “A Microeconomic Approach to Optimal Resource Allocation in Distributed Computer Systems,” IEEE Trans. on Computers 38(5), May 1989. [LAMP86] Lampson, B., “Designing a Global Name Service,” ... proposed in [FERG93], where fragments can be moved and replicated between the nodes of a network of computers, although they are not allowed to be split or coalesced. Transactions, consist...
Ngày tải lên: 28/04/2014, 14:09
computer secuirety s2k
... Improved R-tree Using Fractals”, CS-TR-3032 , Univ. of Maryland Institute for Advanced Computer Studies, Dept. of Computer Science, Univ. of Maryland, Feb. 1994. [LITW80] W. Litwin, “Linear Hashing: ... (2) 19 Recycling Secondary Index Structures * Paul M. Aoki Department of Electrical Engineering and Computer Sciences University of California Berkeley, CA 94720-1776 aoki@CS.Berkeley.ED...
Ngày tải lên: 28/04/2014, 14:09
computer secuirety sec21c privatematch
... exchange secrets. In In Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pages 162–167. 26 COMPUTER SECURITY IN THE 21 CENTURY cal press. While the Agrawal/Evfimievski/Srikant ... simple — it could simply create false entries corresponding to a set of the residents. If any of 36 COMPUTER SECURITY IN THE 21 CENTURY those residents were on the other company’s cust...
Ngày tải lên: 28/04/2014, 14:10