An easily name service is an important asset for the management of a network and a standard service like X.500 could enhance considerably the operation of heterogeneous networks based on the OSI suite. However, the naming scheme used by X.500 is complex and not necessarily user friendly. In this paper, after a short presentation of X.500 operations and names we wil justify a proposition to use untyped "short forms" made of sequences of text tokens and we will develop a set of algorithms for accessing the directory with these short names, before giving comparison and measures of these algorithms. This short form of names is compatible with the naming scheme used in internet, so that we could retain the simplicity and ease of use of the inter...
Recent work in Model Based Reasoning has resulted in the development of automated tools to perform F...
This paper proposes a few steps to escape structured extensive representations for objects, in the c...
This paper proposes a few steps to escape structured extensive representations for objects, in the c...
Ad hoc networks are autonomous dynamic networks composed of mobile devices like personal digital ass...
Projet CERMICSIn this report, we study the problem of the three-dimensional reconstruction of the el...
The accurate solution of the forward electrostatic problem is an essential first step before solving...
The fast growth of high-bandwidth wide-area networks has encouraged the development of computational...
The advance of integration allows implementation of very wide issue superscalar processors on a sing...
The fast growth of high-bandwidth wide-area networks has encouraged the development of computational...
In this paper we present GDS, a new approach for code optimization within the context of embedded sy...
This paper proposes a few steps to escape structured extensive representations for objects, in the c...
In this paper we present GDS, a new approach for code optimization within the context of embedded sy...
Projet CERMICSIn this report, we study the problem of the three-dimensional reconstruction of the el...
The accurate solution of the forward electrostatic problem is an essential first step before solving...
Needham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the se...
Recent work in Model Based Reasoning has resulted in the development of automated tools to perform F...
This paper proposes a few steps to escape structured extensive representations for objects, in the c...
This paper proposes a few steps to escape structured extensive representations for objects, in the c...
Ad hoc networks are autonomous dynamic networks composed of mobile devices like personal digital ass...
Projet CERMICSIn this report, we study the problem of the three-dimensional reconstruction of the el...
The accurate solution of the forward electrostatic problem is an essential first step before solving...
The fast growth of high-bandwidth wide-area networks has encouraged the development of computational...
The advance of integration allows implementation of very wide issue superscalar processors on a sing...
The fast growth of high-bandwidth wide-area networks has encouraged the development of computational...
In this paper we present GDS, a new approach for code optimization within the context of embedded sy...
This paper proposes a few steps to escape structured extensive representations for objects, in the c...
In this paper we present GDS, a new approach for code optimization within the context of embedded sy...
Projet CERMICSIn this report, we study the problem of the three-dimensional reconstruction of the el...
The accurate solution of the forward electrostatic problem is an essential first step before solving...
Needham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the se...
Recent work in Model Based Reasoning has resulted in the development of automated tools to perform F...
This paper proposes a few steps to escape structured extensive representations for objects, in the c...
This paper proposes a few steps to escape structured extensive representations for objects, in the c...