Sciweavers

2702 search results - page 251 / 541
» Message from the Editor
Sort
View
CSFW
2005
IEEE
15 years 10 months ago
Analysis of Typed Analyses of Authentication Protocols
This paper contrasts two existing type-based techniques for the analysis of authentication protocols. The former, proposed by Gordon and Jeffrey, uses dependent types for nonces a...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
ICPPW
2005
IEEE
15 years 10 months ago
Load Balancing Hybrid Programming Models for SMP Clusters and Fully Permutable Loops
This paper emphasizes on load balancing issues associated with hybrid programming models for the parallelization of fully permutable nested loops onto SMP clusters. Hybrid paralle...
Nikolaos Drosinos, Nectarios Koziris
SKG
2005
IEEE
15 years 10 months ago
Building Sensor Filter Grids: Information Architecture for the Data Deluge
—We discuss a general architectural approach to knowledge and information management and delivery in distributed systems. Our approach is based on the recognition that time-stamp...
Geoffrey Fox, Mehmet S. Aktas, Galip Aydin, Andrea...
SRDS
2005
IEEE
15 years 10 months ago
Enforcing Enterprise-wide Policies Over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over interacting software components in enterprise computing environments. This fra...
Zhijun He, Tuan Phan, Thu D. Nguyen
AI
2005
Springer
15 years 10 months ago
Privacy Compliance Enforcement in Email
Privacy is one of the main societal concerns raised by critics of the uncontrolled growth and spread of information technology in developed societies. The purpose of this paper is ...
Quintin Armour, William Elazmeh, Nour El-Kadri, Na...