Sciweavers

501 search results - page 84 / 101
» Access control and key management for mobile agents
Sort
View
ICPPW
2003
IEEE
14 years 2 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
VEE
2005
ACM
130views Virtualization» more  VEE 2005»
14 years 2 months ago
The entropia virtual machine for desktop grids
Desktop distributed computing allows companies to exploit the idle cycles on pervasive desktop PC systems to increase the available computing power by orders of magnitude (10x - 1...
Brad Calder, Andrew A. Chien, Ju Wang, Don Yang
ICOODB
2010
171views Database» more  ICOODB 2010»
13 years 6 months ago
Data Model Driven Implementation of Web Cooperation Systems with Tricia
Abstract. We present the data modeling concepts of Tricia, an opensource Java platform used to implement enterprise web information systems as well as social software solutions inc...
Thomas Büchner, Florian Matthes, Christian Ne...
PROPERTYTESTING
2010
13 years 6 months ago
Transitive-Closure Spanners: A Survey
We survey results on transitive-closure spanners and their applications. Given a directed graph G = (V, E) and an integer k 1, a k-transitive-closure-spanner (k-TC-spanner) of G ...
Sofya Raskhodnikova
COMPSAC
2007
IEEE
14 years 3 months ago
An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment
We present in this paper an adaptive security model for Multi-agent systems. A security meta-model has been developed in which the traditional role concept has been extended. The ...
Liang Xiao 0002, Andrew Peet, Paul H. Lewis, Srina...