Skip to main content

Dartmouth Digital Library Collections

You've searched:

All Collections
  • All fields: wide-area
(7 results)



Display: 50

    • Efficient I/O for computational grid applications.

    • Efficient I/O for computational grid applications.
    • Computer input-output equipment. ; Computational grids (Computer systems). ; High performance computing. ; Electronic data processing -- Distributed processing.
    • High-performance computing increasingly occurs on computational grids composed of heterogeneous and geographically distributed systems of computers, networks, and storage devices that collectively act as a single virtual computer. A key challenge...
    • Naming and sharing resources across administrative boundaries.

    • Naming and sharing resources across administrative boundaries.
    • Electronic data processing -- Distributed processing. ; Computer network architectures. ; Programming languages (Electronic computers) -- Semantics. ; Database management.
    • I tackle the problem of naming and sharing resources across administrative boundaries. Conventional systems manifest the hierarchy of typical administrative structure in the structure of their own mechanism. While natural for communication that...
    • Secure collaboration in an open environment.

    • Secure collaboration in an open environment.
    • Internet -- Security measures. Public key infrastructure (Computer security). Digital signatures. Peer-to-peer architecture (Computer networks) -- Security measures.
    • The Internet has become a virtual place where people not only operate in isolation but also interact with other Internet users. Collaborative systems are becoming more popular. Applications now being introduced could provide better remote education...
    • Information organization algorithms and applications.

    • Information organization algorithms and applications.
    • Computer algorithms. ; Cluster analysis. ; Information organization -- Mathematical models.
    • We consider a problem of information overload: the conflict between vast amounts of data available in electronic form and inadequate tools for finding relevant information. To alleviate this problem we look at the information organization:...
    • Attribute-based, usefully secure email.

    • Attribute-based, usefully secure email.
    • Electronic mail systems -- Security measures. Electronic mail systems -- Social aspects. Trust.
    • A secure system that cannot be used by real users to secure real-world processes is not really secure at all. While many believe that usability and security are diametrically opposed, a growing body of research from the field of Human-Computer...

QuickView

Display a larger image and more item information when the pointer pauses over a thumbnail
on off
 

Layout options:

Thumbnail with title
Grid with smaller thumbnails and more detail
Select the collections to add or remove from your search
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
 
OK