Sciweavers

5790 search results - page 117 / 1158
» Distributed programming with distributed authorization
Sort
View
POPL
2000
ACM
14 years 1 months ago
Generalized Certificate Revocation
We introduce a language for creating and manipulating certificates, that is, digitally signed data based on public key cryptography, and a system for revoking certificates. Our ap...
Carl A. Gunter, Trevor Jim
CD
2005
Springer
14 years 3 months ago
A Methodology for Developing and Deploying Distributed Applications
Abstract. We describe a methodology for developing and deploying distributed Java applications using a reflective middleware system called RAFDA. We illustrate the methodology by d...
Graham N. C. Kirby, Scott M. Walker, Stuart J. Nor...
ISORC
1999
IEEE
14 years 2 months ago
Embedded Platforms for Distributed Real-Time Computing: Challenges and Results
Object-oriented techniques have been along the last decade one of the most useful programming paradigms. However, for distributed embedded systems the semantic gap between the obj...
José Rufino, Guilherme Arroz, Paulo Ver&iac...
PDCAT
2007
Springer
14 years 4 months ago
Exploratory Day-Scale Behavior Assumption-Based User Clustering with the Mobile Clickstream
The mobile Internet enables 24-hour always-on computing with increased demands on time-based analysis. From an assumption that the mobile users are split into three different clus...
Toshihiko Yamakami
ICFP
2008
ACM
14 years 10 months ago
NixOS: a purely functional Linux distribution
Existing package and system configuration management tools suffer from an imperative model, where system administration actions such as upgrading packages or changes to system con...
Andres Löh, Eelco Dolstra