Sciweavers

6348 search results - page 43 / 1270
» Extensible control architectures
Sort
View
WETICE
1998
IEEE
14 years 3 months ago
Using SESAME's GSS-API to add Security to Unix Applications
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...
HPTS
1993
146views Database» more  HPTS 1993»
14 years 2 months ago
Parallel Query Processing in Shared Disk Database Systems
System developments and research on parallel query processing have concentrated either on "Shared Everything" or "Shared Nothing" architectures so far. While t...
Erhard Rahm
ECAI
2006
Springer
14 years 2 months ago
On Probing and Multi-Threading in Platypus
The PLATYPUS approach offers a generic platform for distributed answer set solving, accommodating a variety of different architectures for distributing the search for answer sets a...
Jean Gressmann, Tomi Janhunen, Robert E. Mercer, T...
ECHT
1992
14 years 2 months ago
Hyperform: Using Extensibility to Develop Dynamic, Open and Distributed Hypertext Systems
An approach to exible hyperbase hypertext database support predicated on the notion of extensibility is presented. The extensible hypertext platform Hyperform implements basic hyp...
Uffe Kock Wiil, John J. Leggett
ANSS
2002
IEEE
14 years 3 months ago
A Simulation Based Performance Analysis of a TCP Extension for Best-Effort Multimedia Applications
Since TCP is considered unsuitable for the majority of the emerging multimedia applications, these applications primarily use UDP transport together with proprietary congestion co...
Karl-Johan Grinnemo, Anna Brunstrom