Sciweavers

76 search results - page 13 / 16
» Peer-to-peer access control architecture using trusted compu...
Sort
View
LADS
2007
Springer
14 years 1 months ago
The Webbridge Framework for Building Web-Based Agent Applications
Abstract. Web applications represent an important category of applications that owe much of their popularity to the ubiquitous accessibility using standard web browsers. The comple...
Alexander Pokahr, Lars Braubach
IJWGS
2007
96views more  IJWGS 2007»
13 years 7 months ago
The many faces of the integration of instruments and the grid
: Current grid technologies offer unlimited computational power and storage capacity for scientific research and business activities in heterogeneous areas all over the world. Than...
Francesco Lelli, Eric Frizziero, Michele Gulmini, ...
WETICE
2003
IEEE
14 years 22 days ago
Design and Implementation of Virtual Private Services
Large scale distributed applications such as electronic commerce and online marketplaces combine network access with multiple storage and computational elements. The distributed r...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
MMMACNS
2001
Springer
13 years 12 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
MOBICOM
2004
ACM
14 years 27 days ago
End-to-end performance and fairness in multihop wireless backhaul networks
Wireless IEEE 802.11 networks in residences, small businesses, and public “hot spots” typically encounter the wireline access link (DSL, cable modem, T1, etc.) as the slowest ...
Violeta Gambiroza, Bahareh Sadeghi, Edward W. Knig...