Sciweavers

804 search results - page 136 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
AIPS
2003
15 years 5 months ago
The Role of Planning in Grid Computing
Grid computing gives users access to widely distributed networks of computing resources to solve large-scale tasks such as scientific computation. These tasks are defined as stand...
Jim Blythe, Ewa Deelman, Yolanda Gil, Carl Kesselm...
IAAI
2001
15 years 5 months ago
CARMA: A Case-Based Range Management Advisor
: CARMA is an advisory system for rangeland grasshopper infestations that demonstrates how AI technology can deliver expert advice to compensate for cutbacks in public services. CA...
Karl Branting, John D. Hastings, Jeffrey A. Lockwo...
WMI
2001
112views more  WMI 2001»
15 years 5 months ago
Quality of service and mobility for the wireless internet
Our paper explores the issue of how to provide appropriate quality of service mechanisms closely integrated with flexible mobility management in wireless local area networks. We co...
J. Antonio García-Macías, Franck Rou...
CASCON
1996
140views Education» more  CASCON 1996»
15 years 5 months ago
Improving cohesiveness and flexibility in systems management architectures using distributed object technologies over the intern
Management applications are sensitive to changes in application and system configuration. This coupling makes it difficult and expensive to develop management applications and kee...
Asham El Rayess, Vidar Vetland, Jerome A. Rolia, J...
ESORICS
2010
Springer
15 years 5 months ago
Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems
Abstract. Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and...
Rishab Nithyanand, Gene Tsudik, Ersin Uzun