Sciweavers

1109 search results - page 34 / 222
» Middleware for User Controlled Environments
Sort
View
SOUPS
2009
ACM
14 years 2 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 7 months ago
Promoting Component Reuse by Separating Transmission Policy from Implementation
In this paper we present a methodology and set of tools which assist the construction of applications from components, by separating the issues of transmission policy from compone...
Scott M. Walker, Alan Dearle, Graham N. C. Kirby, ...
CSREAPSC
2006
13 years 9 months ago
An Access Control Framework for Pervasive Computing Environments
Abstract. The explosive evolution of pervasive computing environments presents several new challenges such as smart spaces, invisibility, localized scalability, and masking uneven ...
Sarah Javanmardi, Hadi Hemmati, Rasool Jalili
SC
2004
ACM
14 years 1 months ago
VMPlants: Providing and Managing Virtual Machine Execution Environments for Grid Computing
Virtual machines provide flexible, powerful execution environments for Grid computing, offering isolation and security mechanisms complementary to operating systems, customization...
Ivan Krsul, Arijit Ganguly, Jian Zhang, José...
JSW
2008
99views more  JSW 2008»
13 years 7 months ago
An Intelligent Home Environment based on Service Planning over Peer-to-Peer Overlay Network
With the population of network usage, it is possible to connect home appliances with each other. The basic demand is to connect home appliances easily with less user intervening an...
Chuan-Feng Chiu, Steen J. Hsu, Sen-Ren Jan