Sciweavers

2376 search results - page 297 / 476
» CM - Configuration Change Management
Sort
View
SP
2000
IEEE
112views Security Privacy» more  SP 2000»
14 years 2 months ago
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
In this paper, we describe a novel approach to scalable group re-keying for secure multicast. Our approach, which we call Kronos, is based upon the idea of periodic group re-keyin...
Sanjeev Setia, Samir Koussih, Sushil Jajodia, Eric...
APSEC
1999
IEEE
14 years 2 months ago
Enhancing Object-Based System Composition through Per-Object Mixins
The management of complexity in large systems is traditionally focused on the modeling and management of classes and hierarchies of classes. In order to improve the compositional ...
Gustaf Neumann, Uwe Zdun
RIDE
1999
IEEE
14 years 1 months ago
Establishing Virtual Enterprises by Means of Mobile Agents
Electronic Commerce is expanding from the simple notion of Electronic Store to the notion of Virtual Enterprises (VE) where existing enterprises dynamically form temporary allianc...
Panos K. Chrysanthis, Sujata Banerjee, Shi-Kuo Cha...
ICDE
1998
IEEE
139views Database» more  ICDE 1998»
14 years 1 months ago
Cost and Imprecision in Modeling the Position of Moving Objects
Consider a database that represents the location of moving objects, such as taxi-cabs (typical query: retrieve the cabs that are currently within 1 mile of 33 Michigan Ave., Chica...
Ouri Wolfson, Sam Chamberlain, Son Dao, Liqin Jian...
WETICE
1998
IEEE
14 years 1 months ago
Workgroup Middleware for Distributed Projects*
We have developed a middleware framework for workgroup environments that can support distributed software development and a variety of other application domains requiring document...
Gail E. Kaiser, Stephen E. Dossick