Sciweavers

997 search results - page 55 / 200
» On the Use of Virtualization and Service Technologies to Ena...
Sort
View
ESORICS
2003
Springer
14 years 2 months ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu
CNSM
2010
13 years 15 days ago
Towards non-expert users monitoring networks and services through semantically enhanced visualizations
— Managing networks and services in large virtual enterprises often requires significant expertise to decipher and reconcile information coming from several heterogeneous sources...
Owen Conlan, John Keeney, Cormac Hampson, Fion&aac...
ECIS
2000
13 years 10 months ago
Diffusion of Internet Technologies in Travel Agencies in Australia
Abstract - The Internet appears to playing a role in the restructuring of some traditional business sectors in which some organisations profit and some decline. Travel agencies are...
Craig Standing, Thandarayan Vasudavan
ESWA
2010
109views more  ESWA 2010»
13 years 7 months ago
Visual and tangible interactions with physical and virtual objects using context-aware RFID
Radio Frequency Identification (RFID) has recently received a lot of attention as an augmentation and interface technology with physical and virtual objects in the ubiquitous comp...
Jae Yeol Lee, Dong Woo Seo, Byung Youn Song, Rajit...
GLOBECOM
2009
IEEE
14 years 3 months ago
A Distributed Constraint Satisfaction Problem for Virtual Device Composition in Mobile Ad Hoc Networks
— The dynamic composition of systems of networked appliances, or virtual devices, enables users to generate complex strong specific systems. Current prominent MANET-based composi...
Eric Karmouch, Amiya Nayak