The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Christian Grimm: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Christian Grimm, Steffen Heinze, Eduard Siemens, Stefan Piger, Sven Heese
    Untersuchung und Bewertung von VoIP-Diensten im Gigabit-Wissenschaftsnetz. [Citation Graph (0, 0)][DBLP]
    DFN-Arbeitstagung über Kommunikationsnetze, 2004, pp:119-140 [Conf]
  2. Christian Grimm, Jan Wiebelitz, Stefan Piger, Denis Göhr
    Betrieb sicherer Netzinfrastrukturen für Grid-Umgebungen. [Citation Graph (0, 0)][DBLP]
    DFN-Arbeitstagung über Kommunikationsnetze, 2005, pp:289-303 [Conf]
  3. Christian Grimm, Denis Göhr, Stefan Piger
    Aspekte standortübergreifender mobiler Kommunikationsinfrastrukturen. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 2002, pp:518-522 [Conf]
  4. Christian Grimm, Jens-S. Vöckler, Helmut Pralle
    Load and Traffic Balancing in Large Scale Cache Meshes. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1998, v:30, n:16-18, pp:1687-1695 [Journal]
  5. Christian Grimm, Jens-S. Vöckler, Helmut Pralle
    Request Routing in Cache Meshes. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1998, v:30, n:22-23, pp:2269-2278 [Journal]
  6. Ralf Groeper, Christian Grimm, Stefan Piger, Jan Wiebelitz
    An Architecture for Authorization in Grids using Shibboleth and VOMS. [Citation Graph (0, 0)][DBLP]
    EUROMICRO-SEAA, 2007, pp:367-374 [Conf]

  7. A Comprehensive Approach to Self-Restricted Delegation of Rights in Grids. [Citation Graph (, )][DBLP]


  8. Ansätze zur Steigerung der Verfügbarkeit in Wissenschaftsnetzen. [Citation Graph (, )][DBLP]


  9. Trust Issues in Shibboleth-Enabled Federated Grid Authentication and Authorization Infrastructures Supporting Multiple Grid Middleware. [Citation Graph (, )][DBLP]


  10. A Concept for Grid Credential Lifecycle Management and Heuristic Credential Abuse Detection. [Citation Graph (, )][DBLP]


  11. TCP-AuthN: TCP Inline Authentication to Enhance Network Security in Grid Environments. [Citation Graph (, )][DBLP]


  12. On the Benefit of Caching Traffic Flow Data in the Link Buffer. [Citation Graph (, )][DBLP]


  13. Empirical Analysis of TCP Variants and Their Impact on GridFTP Port Requirements. [Citation Graph (, )][DBLP]


  14. A Concept for Grid Credential Lifecycle Management and Heuristic Credential Abuse Detection. [Citation Graph (, )][DBLP]


  15. TCP-AuthN: An Approach to Dynamic Firewall Operation in Grid Environments. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002