Sciweavers

5252 search results - page 868 / 1051
» Logic in Access Control
Sort
View
PAM
2005
Springer
15 years 10 months ago
Comparison of Public End-to-End Bandwidth Estimation Tools on High-Speed Links
In this paper we present results of a series of bandwidth estimation experiments conducted on a high-speed testbed at the San Diego Supercomputer Center and on OC-48 and GigE paths...
Alok Shriram, Margaret Murray, Young Hyun, Nevil B...
SDMW
2005
Springer
15 years 10 months ago
Metadata Management in Outsourced Encrypted Databases
Abstract. Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where a client’s database is stored at an external servi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
VIZSEC
2005
Springer
15 years 10 months ago
Visualization of Automated Trust Negotiation
We have designed an interactive visualization framework for the automated trust negotiation (ATN) protocol and we have implemented a prototype of the visualizer in Java. This fram...
Danfeng Yao, Michael Shin, Roberto Tamassia, Willi...
CASES
2004
ACM
15 years 10 months ago
A post-compiler approach to scratchpad mapping of code
ScratchPad Memories (SPMs) are commonly used in embedded systems because they are more energy-efficient than caches and enable tighter application control on the memory hierarchy...
Federico Angiolini, Francesco Menichelli, Alberto ...
IUI
2004
ACM
15 years 10 months ago
Flexible interface migration
The goal of this work is to provide users immersed in a multi-platform environment with the possibility of interacting with an application while freely moving from one device to a...
Renata Bandelloni, Fabio Paternò