Sciweavers

631 search results - page 116 / 127
» A user context approach for adaptive and distributed GIS
Sort
View
SASO
2008
IEEE
14 years 2 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
ADC
2007
Springer
145views Database» more  ADC 2007»
14 years 2 months ago
Selectivity Estimation by Batch-Query based Histogram and Parametric Method
Histograms are used extensively for selectivity estimation and approximate query processing. Workloadaware dynamic histograms can self-tune itself based on query feedback without ...
Jizhou Luo, Xiaofang Zhou, Yu Zhang, Heng Tao Shen...
ATAL
2007
Springer
14 years 2 months ago
Dynamic task allocation within an open service-oriented MAS architecture
A MAS architecture consisting of service centers is proposed. Within each service center, a mediator coordinates service delivery by allocating individual tasks to corresponding t...
Ivan Jureta, Stéphane Faulkner, Youssef Ach...
SWS
2004
ACM
14 years 1 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
ICAC
2005
IEEE
14 years 1 months ago
Towards Autonomic Virtual Applications in the In-VIGO System
Grid environments enable users to share non-dedicated resources that lack performance guarantees. This paper describes the design of application-centric middleware components to a...
Jing Xu, Sumalatha Adabala, José A. B. Fort...