• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 385
Next 10 →

ARIES/NT: A Recovery Method Based on Write-Ahead Logging for Nested Transactions

by Kurt Rothermel, C. Mohan , 1989
"... A simple and efficient recovery method for nested transactions, called ARIES/NT (Algorithm for Recovery and Isolation Exploiting Semantics for Nested Transactions), that uses write-ahead logging and supports semantically-rich modes of locking and operation logging is presented. This method applies t ..."
Abstract - Cited by 35 (3 self) - Add to MetaCart
also. ARIES/NT is an extension of the ARIES recovery and concurrency control method developed recently for the single-level transaction model by Mohan. et. al. in the IBM Research Report RJ6649.

IBM Research Report

by Triple Des Cipher, D. B. Johnson, S. M. Matyas, T. J. Watson, Don B. Johnson, Stephen M. Matyas
"... We propose a new mode of multiple encryption, namely "Triple DES cipher block chaining with output feedback masking." The aim is to provide strong protection against certain attacks ("dictionary attacks" and "matching ciphertext attacks") which exploit the DES blocks ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
We propose a new mode of multiple encryption, namely "Triple DES cipher block chaining with output feedback masking." The aim is to provide strong protection against certain attacks ("dictionary attacks" and "matching ciphertext attacks") which exploit the DES blocksize of 64 bits. The new mode obtains this protection through the introduction of secret masking values that are Exclusive-ORed with the intermediate outputs of each triple-DES encryption operation. The secret mask value is derived from a fourth encryption operation per message block, in addition to the three used in previous modes. The new mode is part of a suite of encryption modes proposed in the ANSI X9.F.1 Triple-DES draft standard (X9.52). 1 1 Introduction Much effort has gone into attempted cryptanalysis of multiple DES [2, 3, 4, 6, 8, 10, 11, 14, 17, 18, 21]. Because the DES is still a fundamentally sound base to build on, the American National Standards Institute (ANSI) committee X9.F.1 is working to sta...

IBM Research Report

by Tcp Splicing, David Maltz, T. J. Watson, David A. Maltz, Pravin Bhagwat, Pravin Bhagwat
"... Application layer proxies already play an important role in today's networks, serving as firewalls and HTTP caches --- and their role is being expanded to include encryption, compression, and mobility support services. Current application layer proxies suffer major performance penalties as they ..."
Abstract - Add to MetaCart
Application layer proxies already play an important role in today's networks, serving as firewalls and HTTP caches --- and their role is being expanded to include encryption, compression, and mobility support services. Current application layer proxies suffer major performance penalties as they spend most of their time moving data back and forth between connections; context switching and crossing protection boundaries for each chunk of data they handle. We present a technique called TCP Splice that provides kernel support for data relaying operations which runs at near router speeds. In our lab testing, we find SOCKS firewalls using TCP Splice can sustain a data throughput twice that of normal firewalls, with an average packet forwarding latency 30 times less. KEYWORDS: TCP, Firewalls, SOCKS, Application Layer Proxies, Performance 1. INTRODUCTION Many designs for internet services use split-connection proxies, in which proxy machine is interposed between the server and the client m...

Context-Sensitive Synchronization-Sensitive Analysis is Undecidable

by G. Ramalingam - ACM Transactions on Programming Languages and Systems , 1999
"... This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM ..."
Abstract - Cited by 117 (0 self) - Add to MetaCart
This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM

A condensation approach to privacy preserving data mining

by Charu C. Aggarwal, Charu C. Aggarwal, Philip S. Yu, Philip S. Yu - In EDBT , 2004
"... been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be ..."
Abstract - Cited by 102 (7 self) - Add to MetaCart
been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should

IBM Zurich Labs

by Tyrone Grandison Michael Bilger, Andreas Wespi, Nev Zunic
"... Abstract — Corporate decision makers have normally been disconnected from the details of the security management infrastructures of their organizations. The management of security resources has traditionally been the domain of a small group of skilled and technically savvy professionals, who report ..."
Abstract - Add to MetaCart
Abstract — Corporate decision makers have normally been disconnected from the details of the security management infrastructures of their organizations. The management of security resources has traditionally been the domain of a small group of skilled and technically savvy professionals, who report

IBM Global Business Services Executive Report Government

by unknown authors
"... fact-based strategic insights for senior executives around critical public and private sector issues. This executive brief is based on an in-depth study by the Institute’s research team. It is part of an ongoing commitment by IBM Global Business Services to provide analysis and viewpoints that help ..."
Abstract - Add to MetaCart
fact-based strategic insights for senior executives around critical public and private sector issues. This executive brief is based on an in-depth study by the Institute’s research team. It is part of an ongoing commitment by IBM Global Business Services to provide analysis and viewpoints that help

Understanding Software Systems Using Reverse Engineering Technology -- Perspectives from the Rigi Project

by Hausi A. Müller, Scott R. Tilley, Kenny Wong , 1993
"... Software engineering research has focused mainly on software construction and has neglected software maintenance and evolution. Proposed is a shift in research from synthesis to analysis. Reverse engineering is introduced as a possible solution to program understanding and software analysis. Present ..."
Abstract - Cited by 95 (4 self) - Add to MetaCart
Software engineering research has focused mainly on software construction and has neglected software maintenance and evolution. Proposed is a shift in research from synthesis to analysis. Reverse engineering is introduced as a possible solution to program understanding and software analysis

Proceedings of the IBM PhD Student Symposium

by Andreas Hanemann , 2005
"... LIMITED DISTRIBUTION NOTICE: This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. Ithas been issued as a Research ..."
Abstract - Add to MetaCart
LIMITED DISTRIBUTION NOTICE: This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. Ithas been issued as a Research

DAISY/390: Full System Binary Translation of IBM System/390

by Michael Gschwind, Kemal Ebcioglu, Erik Altman, Sumedh Sathaye , 1999
"... LIMITED DISTRIBUTION NOTICE: This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report ..."
Abstract - Add to MetaCart
LIMITED DISTRIBUTION NOTICE: This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report
Next 10 →
Results 1 - 10 of 385
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University