Sciweavers

2061 search results - page 288 / 413
» Authorization for Metacomputing Applications
Sort
View
HOTOS
1993
IEEE
15 years 8 months ago
Using Reconciliation to Share Files Between Occasionally Connected Computers
Future large distributed systems will be made by interconnecting highly autonomous subsystems, rather than by building ever more elaborate complexes which attempt to provide a sin...
John H. Howard
STACS
1992
Springer
15 years 8 months ago
A Simplified Technique for Hidden-Line Elimination in Terrains
In this paper we give a practical and e cient output-sensitive algorithm for constructing the display of a polyhedral terrain. It runs in Od + nlog2 n time and uses On n space, wh...
Franco P. Preparata, Jeffrey Scott Vitter
137
Voted
SWAT
1992
Springer
101views Algorithms» more  SWAT 1992»
15 years 8 months ago
Parallel Algorithms for Priority Queue Operations
This paper presents parallel algorithms for priority queue operations on a p-processor EREWPRAM. The algorithms are based on a new data structure, the Min-path Heap (MH), which is...
Maria Cristina Pinotti, Geppino Pucci
ECOOPW
1998
Springer
15 years 8 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
ACMACE
2007
ACM
15 years 8 months ago
IGameFloor: a platform for co-located collaborative games
This paper introduces a novel interactive floor platform for social games and entertainment involving multiple colocated users in a collaborative game environment. The interactive...
Kaj Grønbæk, Ole Sejer Iversen, Karen...