Sciweavers

327 search results - page 33 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
NIPS
2004
13 years 11 months ago
Theories of Access Consciousness
Theories of access consciousness address how it is that some mental states but not others are available for evaluation, choice behavior, and verbal report. Farah, O'Reilly, a...
Michael D. Colagrosso, Michael C. Mozer
EUROPAR
2000
Springer
14 years 1 months ago
An Architecture for Web-Based Interaction and Steering of Adaptive Parallel/Distributed Applications
This paper presents an architecture for web-based interaction and steering of parallel/distributed scientific applications. The architecture is composed of detachable thin-clients ...
Rajeev Muralidhar, Samian Kaur, Manish Parashar
WORDS
2005
IEEE
14 years 3 months ago
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments
In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed t...
Smithi Piromruen, James B. D. Joshi
IADIS
2004
13 years 11 months ago
Remote Laboratories for Technological and Scientific Education
In this work, a laboratory of remote access is proposed to perform experiments using the Internet in order to facilitate the propagation of technical and scientific information an...
Cleonilson Souza, Lindbergue Conde, José Fi...
IM
2003
13 years 11 months ago
Facilitating Efficient and Reliable Monitoring through HAMSA
: Monitoring is a fundamental building block of any network management system. It is needed to ensure that the network operates within the required parameters, and to account for u...
David Breitgand, Danny Dolev, Danny Raz, Gleb Shav...