• 沒有找到結果。

[PDF] Top 20 The Implementation and Evaluation of the Proxy Server's Access Control

Has 10000 "The Implementation and Evaluation of the Proxy Server's Access Control" found on our website. Below are the top 20 most common "The Implementation and Evaluation of the Proxy Server's Access Control".

The Implementation and Evaluation of the Proxy Server's Access Control

The Implementation and Evaluation of the Proxy Server's Access Control

... Proxy Server . . . Squid works its way through the http access list from top to bottom when deciding which class you fall into, and also as to if you are denied or allowed ...TCP ... See full document

8

The Implementation and Performance Evaluation of a Dynamic Adaptive Multicast WWW System

The Implementation and Performance Evaluation of a Dynamic Adaptive Multicast WWW System

... : Evaluation of metric PB of large files (up) and small files (down) ...6.CONCLUSIONS AND FUTURE WORK In this paper we develop and implement a adaptive multi- cast web ... See full document

7

The implementation and evaluation of a mobile self- and peer-assessment system

The implementation and evaluation of a mobile self- and peer-assessment system

... in the formation of assessment criteria and scoring ...dialogues and feedback-giving can enhance assessment effectiveness and facilitate collaborative learning (Price & O’Donovan, 2006; ... See full document

8

The design and implementation of a diagnostic test system based on the enhanced S-P model

The design and implementation of a diagnostic test system based on the enhanced S-P model

... depicts the relationship between the online testing subsystem and diagnostic test ...subsystem. The data collected from the online test subsystem is analyzed in the di- agnostic ... See full document

24

The Deployment Experience and Survey of the Cooperative Caching Proxy Server

The Deployment Experience and Survey of the Cooperative Caching Proxy Server

... selection of a next -hop cache, including implicit indications of network ...parent and child relationship between lower level and upper lever proxy ...server. The ... See full document

9

The Design and Implementation of a Mobile Distributed Web Server System

The Design and Implementation of a Mobile Distributed Web Server System

... mobile server can monitor the status of mobile servers, including file ...consisting of some related files, we can monitor these files to ensure ...inside the web ...on the ... See full document

12

Analyze the Impact to Backbone Router of Cooperative Caching Proxy Server.

Analyze the Impact to Backbone Router of Cooperative Caching Proxy Server.

... single proxy server has its limitation in capacity to serve the ...Although the network bandwidth grows with respect to the requirement of user, the proxy ... See full document

22

Design and Implementation of a Flexible Function Access Control Tool for Web Applications

Design and Implementation of a Flexible Function Access Control Tool for Web Applications

... 1.1.2.3 The session object is an essential component of any Web ...name and title deposited by the authentication ...all access control related user data from the session ... See full document

7

The Study of Load Balance and Fault Tolerance of SIP Proxy Server 顏敏峰、黃培壝

The Study of Load Balance and Fault Tolerance of SIP Proxy Server 顏敏峰、黃培壝

... technology of the feature IP network. SIP is also adopted for the technical standard of the feature wireless multimedia communication by the third generation mobile communication ... See full document

2

The Implementation of a Server for a Distributed Class Algebra Database System

The Implementation of a Server for a Distributed Class Algebra Database System

... ones, and they are recorded in the form of a set of range ...in the Java language have types. The user can call these methods if they have a public access ...for ... See full document

8

On the proxy-protected property of Chen et al.'s proxy multisignature schemes

On the proxy-protected property of Chen et al.'s proxy multisignature schemes

... Chung, and Huang proposed a traceable proxy multisignature scheme based on the elliptic curve ...that the original signers can produce a valid signature as the proxy signer does ... See full document

6

Improving the Efficiency of the RFID Tag Access Control Based on Ownership Transferring

Improving the Efficiency of the RFID Tag Access Control Based on Ownership Transferring

... Chung, “New security problem in RFID systems tag killing,” In Proceedings of ACIS 2006, LNCS, Springer-Verlag, vol. Ohkubo, “Low-cost RFID privacy protection scheme,” IPSJ, vol[r] ... See full document

8

The Implementation and Verification for Auxiliary of a Cloud Server in the Internet of Things System 章硯翔、陳雍宗

The Implementation and Verification for Auxiliary of a Cloud Server in the Internet of Things System 章硯翔、陳雍宗

... As the coming up gradually for the combination of the technologies of cloud computing and IOT (internet of thing), a server for this approach is implemented ... See full document

3

The Security of Mambo et al.’s Proxy Signature Scheme

The Security of Mambo et al.’s Proxy Signature Scheme

... 貢獻者: Department of Information Engineering,Feng Chia University 關鍵詞: Digital signature;Proxy signature;Chinese Remainder Theorem. 日期: 2002-05-16[r] ... See full document

1

An Improvement of the Design of Integrating Subliminal Channel with Access Control

An Improvement of the Design of Integrating Subliminal Channel with Access Control

... 上傳時間: 2009-12-17T06:58:12Z 出版者: Asia University 摘要: Recently, Lee and Yang proposed a subliminal scheme which employs an access control in a hierarchy. In their scheme, chief users use a one-way hash ... See full document

1

Design and implementation of the SNMP agents for remote monitoring and control via UML and Petri nets

Design and implementation of the SNMP agents for remote monitoring and control via UML and Petri nets

... consists of the agent and manager sides. The present approach develops SNMP agents based on the UML modeling with PN ...1, the use-case diagram and sequence diagram in UML ... See full document

10

Concurrency Control Access of Dynamic XML Document with the Locking Method

Concurrency Control Access of Dynamic XML Document with the Locking Method

... lock and exclusive lock, are used to implement concurrency ...With the breadth-first search, the search transaction finds level by level some elements which contain all the input ...Only ... See full document

6

An Effective Proxy Caching and Rate Control Mechanism for Transporting Multimedia Streams over the Internet

An Effective Proxy Caching and Rate Control Mechanism for Transporting Multimedia Streams over the Internet

... to the video objects with much larger size, there should be come new mechanisms to increase the hit rate and reduce the start-up delay of each ...cache the initial frames ... See full document

20

Design And Performance Evaluation Of A Non-Preemptive Priority Based Access Control Scheme For IEEE 802.11 DCF Access Method

Design And Performance Evaluation Of A Non-Preemptive Priority Based Access Control Scheme For IEEE 802.11 DCF Access Method

... 3.2 The Adaptive Contention Window Mechanism The collision avoidance portion of CSMA/CA is performed by a variable time-spreading of the users’ ...select the same backoff slot, ... See full document

8

Implementation of Feedback Control for the Optimal Ventilation Device based on the WOB Index

Implementation of Feedback Control for the Optimal Ventilation Device based on the WOB Index

... 題名: Implementation of Feedback Control for the Optimal Ventilation Device based on the WOB Index 作者: 葉信樟;劉康楝;林賢龍 貢獻者: 逢甲大學自動控制工程研究所 Department of Automatic Control ... See full document

1

Show all 10000 documents...