Sciweavers

5790 search results - page 117 / 1158
» Distributed programming with distributed authorization
Sort
View
POPL
2000
ACM
15 years 5 months ago
Generalized Certificate Revocation
We introduce a language for creating and manipulating certificates, that is, digitally signed data based on public key cryptography, and a system for revoking certificates. Our ap...
Carl A. Gunter, Trevor Jim
CD
2005
Springer
15 years 7 months ago
A Methodology for Developing and Deploying Distributed Applications
Abstract. We describe a methodology for developing and deploying distributed Java applications using a reflective middleware system called RAFDA. We illustrate the methodology by d...
Graham N. C. Kirby, Scott M. Walker, Stuart J. Nor...
ISORC
1999
IEEE
15 years 6 months ago
Embedded Platforms for Distributed Real-Time Computing: Challenges and Results
Object-oriented techniques have been along the last decade one of the most useful programming paradigms. However, for distributed embedded systems the semantic gap between the obj...
José Rufino, Guilherme Arroz, Paulo Ver&iac...
88
Voted
PDCAT
2007
Springer
15 years 8 months ago
Exploratory Day-Scale Behavior Assumption-Based User Clustering with the Mobile Clickstream
The mobile Internet enables 24-hour always-on computing with increased demands on time-based analysis. From an assumption that the mobile users are split into three different clus...
Toshihiko Yamakami
103
Voted
ICFP
2008
ACM
16 years 2 months ago
NixOS: a purely functional Linux distribution
Existing package and system configuration management tools suffer from an imperative model, where system administration actions such as upgrading packages or changes to system con...
Andres Löh, Eelco Dolstra