Sciweavers

804 search results - page 85 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
EUROPAR
2001
Springer
15 years 9 months ago
Building Computational Communities from Federated Resources
We describe the design and the implementation in Java and Jini of a Computational Community, which supports the federation of resources from different organisations. Resources fro...
Nathalie Furmento, Steven Newhouse, John Darlingto...
NETWORKING
2004
15 years 6 months ago
Improving Distributed Firewalls Performance through Vertical Load Balancing
In this paper we present an extension to an existing hash based packet classification technique in order to improve its performance in a distributed network access control environm...
Olivier Paul
PET
2004
Springer
15 years 10 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny
ICDE
2003
IEEE
138views Database» more  ICDE 2003»
16 years 6 months ago
Using State Modules for Adaptive Query Processing
We present a query architecture in which join operators are decomposed into their constituent data structures (State Modules, or SteMs), and dataflow among these SteMs is managed ...
Vijayshankar Raman, Amol Deshpande, Joseph M. Hell...
ARCS
2008
Springer
15 years 6 months ago
Intelligent Vehicle Handling: Steering and Body Postures While Cornering
Abstract. Vehicle handling and control is an essential aspect of intelligent driver assistance systems, a building block of the upcoming generation of "smart cars". A car...
Andreas Riener, Alois Ferscha, Michael Matscheko