Sciweavers

666 search results - page 53 / 134
» A Persistent Hyper-Programming System
Sort
View
ACSC
2002
IEEE
14 years 3 months ago
Bracket Capabilities for Distributed Systems Security
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
Mark Evered
CLEAR
2006
Springer
121views Biometrics» more  CLEAR 2006»
14 years 2 months ago
The AIT Outdoors Tracking System for Pedestrians and Vehicles
This paper presents the tracking system from Athens Information Technology that participated to the pedestrian and vehicle surveillance task of the CLEAR 2006 evaluations. Two are ...
Aristodemos Pnevmatikakis, Lazaros Polymenakos, Va...
ADBIS
2010
Springer
206views Database» more  ADBIS 2010»
13 years 12 months ago
CFDC: A Flash-Aware Buffer Management Algorithm for Database Systems
Abstract. Classical buffer replacement policies, e.g., LRU, are suboptimal for database systems having flash disks for persistence, because they are not aware of the distinguished ...
Yi Ou, Theo Härder, Peiquan Jin
ICPADS
1996
IEEE
14 years 2 months ago
Implementation of MAP: A system for mobile assistant programming
We have de ne a network programming model called Mobile Assistant Programming (MAP) for development and execution of communication applications in large scale networks of heteroge...
Stéphane Perret, Andrzej Duda
SIGCOMM
1995
ACM
14 years 1 months ago
Authentication Protocols for Personal Communication Systems
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the communication of the wireless link, contents of t...
Hung-Yu Lin, Lein Harn