Sciweavers

4263 search results - page 819 / 853
» Network Security
Sort
View
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
14 years 29 days ago
Locational Pricing and Scheduling for an Integrated Energy-Reserve Market
It is well known that given a network that can become constrained on voltage or real power flows, reserves must also be spatially located in order to handle all credible contingen...
Jie Chen, James S. Thorp, Robert J. Thomas, Timoth...
KBSE
2003
IEEE
14 years 29 days ago
A Programmable Client-Server Model: Robust Extensibility via DSLs
The client-server model has been successfully used to support a wide variety of families of services in the context of distributed systems. However, its server-centric nature make...
Charles Consel, Laurent Réveillère
SISW
2003
IEEE
14 years 28 days ago
Decentralized Authentication Mechanisms for Object-based Storage Devices
Network-attached object-based storage separates data-path from control-path and enables direct interaction between clients and the storage devices. Clients interact with the file...
Vishal Kher, Yongdae Kim
WMASH
2003
ACM
14 years 28 days ago
Challenge: ubiquitous location-aware computing and the "place lab" initiative
To be widely adopted, location-aware computing must be as effortless, familiar and rewarding as web search tools like Google. We envisage the global scale Place Lab, consisting of...
Bill N. Schilit, Anthony LaMarca, Gaetano Borriell...
ICDCS
2002
IEEE
14 years 19 days ago
On the Performance of Group Key Agreement Protocols
Group key agreement is a fundamental building block for secure peer group communication systems. Several group key agreement protocols were proposed in the last decade, all of the...
Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene...