• No results found

Network servers

McTiny:  fast  high-confidence  post-quantum  key  erasure  for  tiny  network  servers

McTiny: fast high-confidence post-quantum key erasure for tiny network servers

... This paper introduces McTiny, a new protocol that solves the problem of memory-flooding denial-of-service attacks for code-based cryptography. McTiny handles the 1MB keys of the McEliece cryptosystem, having the same ...

18

Resource Management in Cluster Based Network Servers

Resource Management in Cluster Based Network Servers

... A cluster consists of a set of loosely or tightly connected computers that work together. Clusters have each node set to perform the same task, controlled and scheduled by software. . Clustering is used for parallel ...

5

Remote Administration of Network Servers Using Short Message Service

Remote Administration of Network Servers Using Short Message Service

... to network control and administration have also been ...of network administrator or remote access via Internet are identified as common solution to this ...the network administrator will investigate ...

8

A Research on Trusted Cloud Computing with Secure Resources for Multiple Clouds using Data Coloring

A Research on Trusted Cloud Computing with Secure Resources for Multiple Clouds using Data Coloring

... on-demand network access to a shared pool of configurable computing resources(network, servers, storage, applications and services) that can be rapidly provisioned and released with minimal ...

9

An analysis of IP Telephony Signaling using the Session Initiation Protocol (SIP).

An analysis of IP Telephony Signaling using the Session Initiation Protocol (SIP).

... the network. Individual proxy or redirect servers need not, in most cases, process all requests and responses for a particular SIP ...SIP network servers to operate in a stateless fashion, ...

55

Electronic Commerce Network 						Modeling of						Randomly Broken Multi-channel Servers with						Human Factor

Electronic Commerce Network Modeling of Randomly Broken Multi-channel Servers with Human Factor

... the network server possesses all customer information and the checkout time is relatively fixed but the checkout spend depends on how many channels are opened and available by the network ...of ...

6

On the Selection of Servers by Load Balancing of Network Traffic for Content-Streaming Data Centers.

On the Selection of Servers by Load Balancing of Network Traffic for Content-Streaming Data Centers.

... balancing“South-North” network traffic when streaming heavy content through a data-center ...the servers in the data center are capable of catering to any request for content and identifies all possible ...

53

Auxiliary variables for Bayesian inference in multi class queueing networks

Auxiliary variables for Bayesian inference in multi class queueing networks

... bottleneck network in Figure 1 ...the network. In each iteration, the sampler begins with a network path whose task tran- sitions are fully compatible with the existing ...

14

ANALYSIS OF CLOUD VENDORS IN INDIAN ENVIORNMENT

ANALYSIS OF CLOUD VENDORS IN INDIAN ENVIORNMENT

... Cloud Computing is a new term for a long-held dream of computing as a utility, which has recently emerged as a commercial reality. Cloud computing is a model for enabling on-demand network access in order to share ...

6

4699 01 3+Open MS OS2 LAN Manager User Guide Jan89 pdf

4699 01 3+Open MS OS2 LAN Manager User Guide Jan89 pdf

... Chapter 1: LAN Manager Overview Local Area Networks and LAN manager 1-2 Working with the Local Area Network 1-3 Network Administrators 1-4 Network Netstations and Servers 1-4 Network Com[r] ...

222

LOSAD-A Location Service Based on MANET for Mobile Police Officers

LOSAD-A Location Service Based on MANET for Mobile Police Officers

...  Dynamic Topology: This is also the major problem with ad-hoc routing since the topology is not constant. The mobile node might move or medium characteristics might change. In ad-hoc networks, routing tables must ...

6

Cloud Computing for Agriculture- An Incipient Technology

Cloud Computing for Agriculture- An Incipient Technology

... private network using one or more data centers, shared among multiple customers with varying degrees of data privacy ...cloud’s servers, storage systems, and ...

7

Network Location Problem with Stochastic and Uniformly Distributed Demands

Network Location Problem with Stochastic and Uniformly Distributed Demands

... the network location problem for single-server facilities that are subjected to ...each network edge, customers are uniformly distributed, and their requests for service are assumed to be generated ...

9

DNS64: DNS Extensions for Network Address Translation from IPv6 Clients to IPv4 Servers

DNS64: DNS Extensions for Network Address Translation from IPv6 Clients to IPv4 Servers

... These mechanisms are expected to play a critical role in the IPv4- IPv6 transition and coexistence. Due to IPv4 address depletion, it is likely that in the future, many IPv6-only clients will want to connect to ...

32

A Solution to Problem of Limited Resources in Education Using Semantic Web and Interoperability of Cloud Computing

A Solution to Problem of Limited Resources in Education Using Semantic Web and Interoperability of Cloud Computing

... The provider's computing resources are collected to serve multipleconsumers using a multi-tenant model, different physical and virtual resources are dynamically assigned and reassigned according to consumer demand. There ...

8

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

... Currently, n- Logue has around 25 LSPs and this is expected to grow to 100's shortly. Each LSP in n-Logue has the following elements to provide voice and internet services; corDECT WiLL system, Minnow Servers, ...

6

Title: VIRTUALIZATION IN CLOUD COMPUTING

Title: VIRTUALIZATION IN CLOUD COMPUTING

... the servers that were used has a lost of disadvantages and were not at all cost ...“These servers are maintained by system administrator, normally these servers are described as combined unit that ...

5

17 Network Programming Servers pdf

17 Network Programming Servers pdf

... tutorial Available at public venues,Customized or customized Java EE Training: versions http://courses.coreservlets.com/ can be held on-site at your Java 6 or 7, JSF 2.0, PrimeFaces, Ser[r] ...

12

Recognizing the flaw in polymers by Image processing

Recognizing the flaw in polymers by Image processing

... Live video acquisition is one library function provided by Math works MATLAB, to be employed in calling camera or web camera. The library may be employed in applications that are built using MATLAB. With the continual ...

5

Study And Performance Evaluation On Recent Ddos Trends Of Defense On Web Servers

Study And Performance Evaluation On Recent Ddos Trends Of Defense On Web Servers

... DDoS attackers as their army to launch attack. These compromised machines are called Masters/Handlers or Zombies and are collectively called bots and the attack network is called botnet in hacker’s community. An ...

10

Show all 10000 documents...

Related subjects