Sciweavers

2261 search results - page 74 / 453
» Dynamic types for authentication
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Dynamic Control of Coding in Delay Tolerant Networks
Abstract--We study replication mechanisms that include ReedSolomon type codes as well as network coding in order to improve the probability of successful delivery within a given ti...
Eitan Altman, Francesco De Pellegrini, Lucile Sass...
CONCUR
2000
Springer
14 years 1 months ago
The Control of Synchronous Systems
In the synchronous composition of processes, one process may prevent another process from proceeding unless compositions without a wellde ned productbehavior are ruled out. They ca...
Luca de Alfaro, Thomas A. Henzinger, Freddy Y. C. ...
GCC
2003
Springer
14 years 2 months ago
Research on Construction of EAI-Oriented Web Service Architecture
Web service based data exchange has been the trend of EAI. We can create Proxies to expose existing systems as web services. There have been some tools that can help users to const...
Xin Peng, Wenyun Zhao, En Ye
IEEEIAS
2008
IEEE
14 years 3 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
DASFAA
1993
IEEE
127views Database» more  DASFAA 1993»
14 years 1 months ago
An Object-Centered Data Model for Engineering Design Databases
: Entities in engineering design databases need to evolve in both structure and behavior. Such a need is not well addressed by object-oriented data models based on the class concep...
Huibin Zhao, Alexandros Biliris