Sciweavers

328 search results - page 47 / 66
» Identity-Enriched Session Management
Sort
View
INFOCOM
2002
IEEE
14 years 16 days ago
Routing in Overlay Multicast Networks
— Multicast services can be provided either as a basic network service or as an application-layer service. Higher level multicast implementations often provide more sophisticated...
Sherlia Shi, Jonathan S. Turner
HT
2000
ACM
13 years 12 months ago
Hypermedia in the virtual project room - toward open 3D spatial hypermedia
This paper discusses hypermedia aspects of the design of a Virtual Project Room. Based on ethnographic and participatory design studies of landscape architects’ and architects&#...
Preben Mogensen, Kaj Grønbæk
UIST
2000
ACM
13 years 12 months ago
A temporal model for multi-level undo and redo
A number of recent systems have provided rich facilities for manipulating the timelines of applications. Such timelines represent the history of an application’s use in some ses...
W. Keith Edwards, Takeo Igarashi, Anthony LaMarca,...
ISADS
1999
IEEE
13 years 12 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
SERA
2010
Springer
13 years 6 months ago
The Software Modeling and Implementation of Reliable Server Pooling and RSPLIB
Abstract—With the growing complexity of software applications, there is an increasing demand for solutions to distribute workload into server pools. Grid Computing provides power...
Xing Zhou, Thomas Dreibholz, Martin Becke, Jobin P...