Sciweavers

1860 search results - page 202 / 372
» Jiro Storage Management
Sort
View
DOA
2000
159views more  DOA 2000»
15 years 6 months ago
Mobile Code as an Enabling Technology for Service-Oriented Smartcard Middleware
Smartcards can be seen as service providing entities that implement a secure, tamper-proof storage and offer computational resources which make them ideally suited for a variety o...
Roger Kehr, Michael Rohs, Harald Vogt
SOSP
1997
ACM
15 years 6 months ago
Automated Hoarding for Mobile Computers
A common problem facing mobile computing is disconnected operation, or computing in the absence of a network. Hoarding eases disconnected operation by selecting a subset of the us...
Geoffrey H. Kuenning, Gerald J. Popek

Publication
103views
15 years 6 months ago
How to Use Vectors for Representing Ground Expressions in the Implementations of the Language Refal
Most implementations of the language Refal represent ground expressions by doubly-linked lists, which results in low-cost concatenation. On the other hand, that representation nece...
Sergei M. Abramov, Sergei A. Romanenko
IJNSEC
2008
85views more  IJNSEC 2008»
15 years 4 months ago
A Self-healing Key Distribution Scheme with Novel Properties
We improve a secret sharing scheme, which enables users select their personal keys by themselves instead of being distributed by group manager and users can reuse their personal k...
Biming Tian, Mingxing He
INFORMATICALT
2006
75views more  INFORMATICALT 2006»
15 years 4 months ago
Repository for Business Rules Based IS Requirements
The quality of software engineering projects often suffers due to the large gap between the way stakeholders present their requirements and the way analysts capture and express tho...
Kestutis Kapocius, Rimantas Butleris