Sciweavers

1259 search results - page 222 / 252
» On Survivable Access Network Design: Complexity and Algorith...
Sort
View
POLICY
2004
Springer
15 years 9 months ago
Responding to Policies at Runtime in TrustBuilder
Automated trust negotiation is the process of establishing trust between entities with no prior relationship through the iterative disclosure of digital credentials. One approach ...
Bryan Smith, Kent E. Seamons, Michael D. Jones
ICDCS
1998
IEEE
15 years 8 months ago
NFS/M: An Open Platform Mobile File System
With the advancement of wireless network and mobile computing, there is an increasing need to build a mobile le system that can perform e ciently and correctly for accessing onlin...
John C. S. Lui, Oldfield K. Y. So, T. S. Tam
DRM
2006
Springer
15 years 7 months ago
Towards a secure and interoperable DRM architecture
In this paper we look at the problem of interoperability of digital rights management (DRM) systems in home networks. We introduce an intermediate module called the Domain Interop...
Gelareh Taban, Alvaro A. Cárdenas, Virgil D...
OSDI
2002
ACM
16 years 4 months ago
Taming Aggressive Replication in the Pangaea Wide-Area File System
Pangaea is a wide-area file system that supports data sharing among a community of widely distributed users. It is built on a symmetrically decentralized infrastructure that consi...
Yasushi Saito, Christos T. Karamanolis, Magnus Kar...
IMC
2009
ACM
15 years 10 months ago
Practical beamforming based on RSSI measurements using off-the-shelf wireless clients
WLANs have become an important last-mile technology for providing internet access within homes and enterprises. In such indoor deployments, the wireless channel suffers from signi...
Sriram Lakshmanan, Karthikeyan Sundaresan, Sampath...