Sciweavers

171 search results - page 6 / 35
» Meeting central: making distributed meetings more effective
Sort
View
SPC
2005
Springer
14 years 1 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
IPPS
2005
IEEE
14 years 1 months ago
GUARD: Gossip Used for Autonomous Resource Detection
A growing trend in the development and deployment of grid computing systems is decentralization. Decentralizing these systems helps make them more scalable and robust, but poses s...
Sagnik Nandy, Larry Carter, Jeanne Ferrante
CONCURRENCY
2007
118views more  CONCURRENCY 2007»
13 years 8 months ago
Design and implementation issues for distributed CCA framework interoperability
Component frameworks, including those that support the Common Component Architecture (CCA), represent a promising approach to addressing this challenge, one that is being realized...
Madhusudhan Govindaraju, Michael J. Lewis, Kenneth...
HICSS
2003
IEEE
90views Biometrics» more  HICSS 2003»
14 years 1 months ago
Information Technology Augmentation of The Skilled Facilitator Approach
Work in the new millennium requires globally distributed organizational members to collaborate in groups and make decisions. In general, research has shown that groups that use fa...
Mark Adkins, Robert Younger, Roger Schwarz
LCN
2005
IEEE
14 years 1 months ago
Filtering of Shrew DDoS Attacks in Frequency Domain
—The shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks coul...
Yu Chen, Kai Hwang, Yu-Kwong Kwok