Now showing items 11-20 of 266
Electromagnetic Interference by Wind Turbine Generators
(1978-03-01)
The interference produced by horizontal wind axis turbine generators
on a number of electromagnetic systems has been identified and quantified.
The interference to TV reception has been exhaustively studied, and a
method ...
Secure Coprocessor Integration with Kerberos V5
(Center for Information Technology Integration, 2000-03-22)
The nightmare of Trusted Third Party (t3P) based protocol users is compromise of the T3P. Because the compromised T3P can read and modify any user information, the entire user group becomes vulnerable to secret revelation ...
Taking a LITTLE WORK Along
(Center for Information Technology Integration, 1991-08-28)
The continuing micro-miniaturization of components has moved high-powered, microprocessor-based machines from the desktop, to the laptop, to notebook-sized, and now to palmtop computers. These machines are distinguished ...
Regular languages in NC1
(Elsevier, 1992-06)
We give several characterizations, in terms of formal logic, semigroup theory, and operations on languages, of the regular languages in the circuit complexity class AC0, thus answering a question of Chandra, Fortune, and ...
Access Control in a Workstation-Based Distributed Computing Environment
(Center for Information Technology Integration, 1990-07-17)
This paper describes the mechanisms employed to control access to system services on the IFS project. We base our distributed computing environment on systems that we trust, and run those systems in physically secure rooms. ...
The 10 Mbps Advanced Packet Vault
(Center for Information Technology Integration, 2001-10-04)
This paper describes the Advanced Packet Vault, a cryptographically secured archiver of network packet data that reliably captures all packets on a 10 Mbps Ethernet network, encrypts them, and writes them to long-term ...
malloc() Performance in a Multithreaded Linux Environment
(Center for Information Technology Integration, 2000-05-02)
Network servers make special demands that other types of applications may not make on memory allocators. We describe a simple malloc() microbenchmark suite that tests the ability of malloc() to divide its work efficiently ...
Depth from relative normal flows
(Elsevier, 1990)
Most of the depth from image flow algorithms has to rely on either good initial guesses, or some assumptions about the object surfaces to achieve solutions that agree with the physical world. Waxman and Sinha point out ...
Efficient Kerberized Multicast in a Practical Distributed Setting
(Center for Information Technology Integration, 2001-08-21)
Many of today's distributed applications are based on group communication. Given the openness of today's networks, communication among group members must be secure and, at the same time, efficient. In this paper we consider ...