Sciweavers

125 search results - page 22 / 25
» Enabling power management for network-attached computers
Sort
View
DL
1999
Springer
166views Digital Library» more  DL 1999»
13 years 12 months ago
Semantic Indexing for a Complete Subject Discipline
As part of the Illinois Digital Library Initiative (DLI) project we developed “scalable semantics” technologies. These statistical techniques enabled us to index large collect...
Yi-Ming Chung, Qin He, Kevin Powell, Bruce R. Scha...
CCS
2006
ACM
13 years 11 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
FGCS
2010
84views more  FGCS 2010»
13 years 6 months ago
System-level virtualization research at Oak Ridge National Laboratory
System-level virtualization is today enjoying a rebirth, after first gaining popularity in the 1970s as a technique to effectively share what were then considered large computin...
Stephen L. Scott, Geoffroy Vallée, Thomas N...
GIS
2005
ACM
14 years 8 months ago
Monitoring dynamic spatial fields using responsive geosensor networks
Information about dynamic spatial fields, such as temperature, windspeed, or the concentration of gas pollutant in the air, is important for many environmental applications. At th...
Matt Duckham, Silvia Nittel, Michael F. Worboys
FC
2007
Springer
158views Cryptology» more  FC 2007»
14 years 1 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou