Sciweavers

299 search results - page 52 / 60
» Managing Access Control for Presence-Based Services
Sort
View
COMCOM
2007
100views more  COMCOM 2007»
13 years 8 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia
COST
1994
Springer
159views Multimedia» more  COST 1994»
14 years 17 days ago
A Mail-Based Teleservice Architecture for Archiving and Retrieving Dynamically Composable Multimedia Documents
In this paper, a teleservice for archiving and retrieving multimedia documents using public networks is described. This teleservice encourages a broad range of commercially applic...
Heiko Thimm, Katja Röhr, Thomas C. Rakow
PVLDB
2010
166views more  PVLDB 2010»
13 years 6 months ago
Towards Elastic Transactional Cloud Storage with Range Query Support
Cloud storage is an emerging infrastructure that offers Platforms as a Service (PaaS). On such platforms, storage and compute power are adjusted dynamically, and therefore it is i...
Hoang Tam Vo, Chun Chen, Beng Chin Ooi
MOBIQUITOUS
2005
IEEE
14 years 2 months ago
MAIPAN - Middleware for Application Interconnection in Personal Area Networks
This paper proposes the Middleware for Application Interconnection in Personal Area Networks (MAIPAN), a middleware that provides a uniform computing environment for creating dyna...
Miklós Aurél Rónai, Kristof F...
IM
2003
13 years 9 months ago
Facilitating Efficient and Reliable Monitoring through HAMSA
: Monitoring is a fundamental building block of any network management system. It is needed to ensure that the network operates within the required parameters, and to account for u...
David Breitgand, Danny Dolev, Danny Raz, Gleb Shav...