Sciweavers

390 search results - page 48 / 78
» Novel architectures for P2P applications: the continuous-dis...
Sort
View
ISCC
2009
IEEE
176views Communications» more  ISCC 2009»
14 years 3 months ago
Integrating user Identity Management systems with the Host Identity Protocol
Abstract—Identity Management (IdM) on the application layer improves the usability and security for end users by offering features like Single Sign-On and attribute provisioning....
Marc Barisch, Alfredo Matos
ASPLOS
1991
ACM
14 years 7 days ago
Code Generation for Streaming: An Access/Execute Mechanism
Access/execute architectures have several advantages over more traditional architectures. Because address generation and memory access are decoupled from operand use, memory laten...
Manuel E. Benitez, Jack W. Davidson
SOFTWARE
2002
13 years 8 months ago
Overview of Fuzzy-RED in Diff-Serv Networks
The rapid growth of the Internet and increased demand to use the Internet for time-sensitive voice and video applications necessitate the design and utilization of new Internet arc...
Loukas Rossides, Chrysostomos Chrysostomou, Andrea...
ICNP
2006
IEEE
14 years 2 months ago
Vault: A Secure Binding Service
— Binding services are crucial building blocks in networks and networked applications. A binding service (e.g., the Domain Name System (DNS)) maps certain information, namely, bi...
Guor-Huar Lu, Changho Choi, Zhi-Li Zhang
COOPIS
2004
IEEE
14 years 13 days ago
GRIDKIT: Pluggable Overlay Networks for Grid Computing
A `second generation' approach to the provision of Grid middleware is now emerging which is built on service-oriented architecture and web services standards and technologies....
Paul Grace, Geoff Coulson, Gordon S. Blair, Lauren...