Sciweavers

1320 search results - page 178 / 264
» Flexible Dataspace Management Through Model Management
Sort
View
SAC
2004
ACM
14 years 4 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
WMTE
2002
IEEE
14 years 3 months ago
Applying Wireless Technologies to Build a Highly Interactive Learning Environment
This study tries to apply wireless technologies to build a highly interactive environment. For this purpose, this study first identifies four types of interaction between the memb...
Tzu-Chien Liu, Hsue-Yie Wang, Jen-Kai Liang, Tak-W...
SIGIR
1999
ACM
14 years 3 months ago
Content-Based Retrieval for Music Collections
A content-based retrieval model for tackling the mismatch problems specific to music data is proposed and implemented. The system uses a pitch profile encoding for queries in any ...
Yuen-Hsien Tseng
OOPSLA
1998
Springer
14 years 2 months ago
JRes: A Resource Accounting Interface for Java
With the spread of the Internet the computing model on server systems is undergoing several important changes. Recent research ideas concerning dynamic operating system extensibil...
Grzegorz Czajkowski, Thorsten von Eicken
AFRICACRYPT
2010
Springer
14 years 2 months ago
Efficient Unidirectional Proxy Re-Encryption
Abstract. Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only...
Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robe...