Sciweavers

250 search results - page 30 / 50
» Automatically constructing trusted cluster computing environ...
Sort
View
DISCEX
2003
IEEE
14 years 21 days ago
Monterey Security Enhanced Architecture Project
This research project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mech...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
CHI
2004
ACM
14 years 7 months ago
Automatic support for web user studies with SCONE and TEA
This paper describes the concepts of TEA, a flexible tool that supports user tests by automating repetitive tasks and collecting data of user inputs and actions. TEA was specifica...
Hartmut Obendorf, Harald Weinreich, Torsten Hass
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
14 years 20 days ago
Using Replication and Partitioning to Build Secure Distributed Systems
A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. T...
Lantian Zheng, Stephen Chong, Andrew C. Myers, Ste...
ICDCS
2007
IEEE
14 years 1 months ago
An Asymmetric Quorum-based Power Saving Protocol for Clustered Ad Hoc Networks
Clustering in Mobile Ad Hoc Networks (MANETs) has shown to be a promising technique to ensure the scalability and efficiency of various communication protocols. Since stations in...
Shan-Hung Wu, Chung-Min Chen, Ming-Syan Chen
SKG
2006
IEEE
14 years 1 months ago
Experiments Study for Scientific Texts Domain Keyword Acquisition
Scientific texts domain keyword is one of the basic elements of the text high-level semantics acquisition, domain ontology building and the knowledge representation in semantic gr...
Xiangfeng Luo, Ning Fang, Weimin Xu, Sheng Yu, Kai...