Sciweavers

1320 search results - page 179 / 264
» Flexible Dataspace Management Through Model Management
Sort
View
ESORICS
2008
Springer
14 years 13 days ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen
ESANN
2001
14 years 1 days ago
Applications of neuro-fuzzy classification, evaluation and forecasting techniques in agriculture
Aim of the present article is to show the results obtained from the application of neuro-fuzzy methodology in the solution of agriculture problems like the Bactrocera Oleae (olive...
Elena Bellei, Diego Guidotti, Ruggero Petacchi, Le...
ICDCSW
2007
IEEE
13 years 10 months ago
A Middleware Support for Agent-Based Application Mobility in Pervasive Environments
—Application mobility is an efficient way to mask uneven conditioning and reduce users’ distractions in pervasive environments. However, since mobility brings more dynamism and...
Yu Zhou, Jiannong Cao, Vaskar Raychoudhury, Joanna...
CLEIEJ
2006
147views more  CLEIEJ 2006»
13 years 10 months ago
JADIMA: Virtual Machine Architecture for building JAVA Applications on Grid Platforms
This paper describes JADIMA (Java Distributed Machine), a collaborative platform to construct high performance distributed JAVA applications. JADIMA is a system that automatically...
Yudith Cardinale, Eduardo Blanco, Jesús De ...
MAM
2006
125views more  MAM 2006»
13 years 10 months ago
Stream computations organized for reconfigurable execution
Reconfigurable systems can offer the high spatial parallelism and fine-grained, bit-level resource control traditionally associated with hardware implementations, along with the f...
André DeHon, Yury Markovsky, Eylon Caspi, M...