Sciweavers

1784 search results - page 269 / 357
» A Service Model for Component-Based Development
Sort
View
HICSS
2002
IEEE
128views Biometrics» more  HICSS 2002»
14 years 2 months ago
Flexible Instructional Strategies for E-learning
This paper provides an overview on a German lighthouse research project called L3 in the area of e-learning systems that supply e-learning services via a virtual private network. ...
Michael Altenhofen, Joachim Schaper
MDM
2009
Springer
169views Communications» more  MDM 2009»
14 years 1 months ago
Adaptive Query Routing on Distributed Context - The COSINE Framework
Context-awareness has become a desired key feature of today’s mobile systems, yet, its realization still remains a challenge. On the one hand, mobile computing provides great po...
Lukasz Juszczyk, Harald Psaier, Atif Manzoor, Scha...
INFOCOM
2000
IEEE
14 years 24 days ago
A Modular Approach to Packet Classification: Algorithms and Results
The ability to classify packets according to pre-defined rules is critical to providing many sophisticated value-added services, such as security, QoS, load balancing, traffic acco...
Thomas Y. C. Woo
LISA
2007
13 years 11 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
IADIS
2004
13 years 10 months ago
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI
We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
Diana Berbecaru, Antonio Lioy