Sciweavers

172 search results - page 26 / 35
» Enforcing synchronous system properties on top of timed syst...
Sort
View
SACMAT
2005
ACM
14 years 27 days ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
ICPP
2003
IEEE
14 years 19 days ago
Distributed Page Ranking in Structured P2P Networks
This paper discusses the techniques of performing distributed page ranking on top of structured peer-to-peer networks. Distributed page ranking are needed because the size of the ...
Shuming Shi, Jin Yu, Guangwen Yang, Dingxing Wang
ICDCS
2005
IEEE
14 years 29 days ago
Optimal Asynchronous Garbage Collection for RDT Checkpointing Protocols
Communication-induced checkpointing protocols that ensure rollback-dependency trackability (RDT) guarantee important properties to the recovery system without explicit coordinatio...
Rodrigo Schmidt, Islene C. Garcia, Fernando Pedone...
MM
1993
ACM
126views Multimedia» more  MM 1993»
13 years 11 months ago
CMIFed: A Presentation Environment for Portable Hypermedia Documents
as a tree which specifies the presentation in an abstract, machineindependent way. This specification is created and edited using an authoring system; it is mapped to a particula...
Guido van Rossum, Jack Jansen, K. Sjoerd Mullender...
ICMI
2003
Springer
111views Biometrics» more  ICMI 2003»
14 years 16 days ago
Distributed and local sensing techniques for face-to-face collaboration
This paper describes techniques that allow users to collaborate on tablet computers that employ distributed sensing techniques to establish a privileged connection between devices...
Ken Hinckley