Sciweavers

327 search results - page 33 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
135
Voted
NIPS
2004
15 years 4 months ago
Theories of Access Consciousness
Theories of access consciousness address how it is that some mental states but not others are available for evaluation, choice behavior, and verbal report. Farah, O'Reilly, a...
Michael D. Colagrosso, Michael C. Mozer
131
Voted
EUROPAR
2000
Springer
15 years 6 months ago
An Architecture for Web-Based Interaction and Steering of Adaptive Parallel/Distributed Applications
This paper presents an architecture for web-based interaction and steering of parallel/distributed scientific applications. The architecture is composed of detachable thin-clients ...
Rajeev Muralidhar, Samian Kaur, Manish Parashar
WORDS
2005
IEEE
15 years 8 months ago
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments
In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed t...
Smithi Piromruen, James B. D. Joshi
121
Voted
IADIS
2004
15 years 4 months ago
Remote Laboratories for Technological and Scientific Education
In this work, a laboratory of remote access is proposed to perform experiments using the Internet in order to facilitate the propagation of technical and scientific information an...
Cleonilson Souza, Lindbergue Conde, José Fi...
139
Voted
IM
2003
15 years 4 months ago
Facilitating Efficient and Reliable Monitoring through HAMSA
: Monitoring is a fundamental building block of any network management system. It is needed to ensure that the network operates within the required parameters, and to account for u...
David Breitgand, Danny Dolev, Danny Raz, Gleb Shav...