Sciweavers

1083 search results - page 201 / 217
» Performance of Underwater Ad-Hoc Networks
Sort
View
GLOBECOM
2008
IEEE
14 years 3 months ago
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Yong Hao, Yu Cheng, Kui Ren
DSOM
2005
Springer
14 years 2 months ago
SLA Design from a Business Perspective
Abstract. A method is proposed whereby values for Service Level Objectives (SLOs) of an SLA can be chosen to reduce the sum IT infrastructure cost plus business financial loss. Bu...
Jacques Philippe Sauvé, Filipe Marques, Ant...
ICWE
2004
Springer
14 years 2 months ago
Loosely Coupled Web Services in Remote Object Federations
Abstract Loosely coupled services are gaining importance in many business domains. However, compared to OO-RPC middleware approaches, emerging technologies proposed to implement lo...
Uwe Zdun
POLICY
2004
Springer
14 years 2 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
ISORC
2000
IEEE
14 years 1 months ago
Deadline Handling in Real-Time Distributed Objects
: Deadline handling is a fundamental part of real-time computing but has been practiced in ad hoc forms for decades. A general framework for systematic deadline handling in real-ti...
K. H. Kim, Juqiang Liu, Moon-hae Kim