Sciweavers

372 search results - page 61 / 75
» A Reference Model for Firewall Technology
Sort
View
IJHPCA
2007
116views more  IJHPCA 2007»
13 years 7 months ago
Parallel Languages and Compilers: Perspective From the Titanium Experience
We describe the rationale behind the design of key features of Titanium—an explicitly parallel dialect of JavaTM for high-performance scientific programming—and our experienc...
Katherine A. Yelick, Paul N. Hilfinger, Susan L. G...
JCM
2007
143views more  JCM 2007»
13 years 7 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
JMM
2007
107views more  JMM 2007»
13 years 7 months ago
Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wi...
Rene Mayrhofer, Roswitha Gostner
JSW
2007
119views more  JSW 2007»
13 years 7 months ago
Formalizing Mobility in Service Oriented Computing
— The usual scenario of service oriented systems is characterized by several services offering the same functionalities, by new services that are continuosly deployed and by othe...
Claudio Guidi, Roberto Lucchi
ICSOC
2009
Springer
13 years 5 months ago
Future Research Topics in Enterprise Architecture Management - A Knowledge Management Perspective
Identifying, gathering, and maintaining information on the current, planned, and target states of the architecture of an enterprise is one major challenge of enterprise architectur...
Sabine Buckl, Florian Matthes, Christian M. Schwed...