Sciweavers

417 search results - page 71 / 84
» Invisible Network: Concepts and Architecture
Sort
View
IEEEARES
2006
IEEE
14 years 1 months ago
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Christian Schläger, Thomas Nowey, José...
CAMP
2005
IEEE
14 years 1 months ago
Virtual Astronomy, Information Technology, and the New Scientific Methodology
—All sciences, including astronomy, are now entering the era of information abundance. The exponentially increasing volume and complexity of modern data sets promises to transfor...
S. George Djorgovski
PRDC
2005
IEEE
14 years 1 months ago
Partitioned Cache Shadowing for Deep Sub-Micron (DSM) Regime
An important issue in modern cache designs is bridging the gap between wire and device delays. This warrants the use of more regular and modular structures to mask wire latencies....
Heng Xu, Arun K. Somani
WAC
2005
Springer
123views Communications» more  WAC 2005»
14 years 1 months ago
Service Evolution in a Nomadic Wireless Environment
Abstract. In this paper, we present and analyze a framework for selfevolving autonomic services in a wireless nomadic environment. We present a disconnected network architecture, w...
Iacopo Carreras, Francesco De Pellegrini, Daniele ...
UPP
2004
Springer
14 years 29 days ago
Overview of Generative Software Development
Abstract. System family engineering seeks to exploit the commonalities among systems from a given problem domain while managing the variabilities among them in a systematic way. In...
Krzysztof Czarnecki