Sciweavers

282 search results - page 33 / 57
» Private Policy Negotiation
Sort
View
AIMS
2008
Springer
14 years 2 months ago
N2N: A Layer Two Peer-to-Peer VPN
The Internet was originally designed as a flat data network delivering a multitude of protocols and services between equal peers. Currently, after an explosive growth fostered by ...
Luca Deri, Richard Andrews
CCS
2001
ACM
14 years 1 months ago
Flexible authentication of XML documents
XML is increasingly becoming the format of choice for information exchange on the Internet. As this trend grows, one can expect that documents (or collections thereof) may get qui...
Premkumar T. Devanbu, Michael Gertz, April Kwong, ...
FPL
2008
Springer
116views Hardware» more  FPL 2008»
13 years 10 months ago
Shared reconfigurable architectures for CMPS
This paper investigates reconfigurable architectures suitable for chip multiprocessors (CMPs). Prior research has established that augmenting a conventional processor with reconfi...
Matthew A. Watkins, Mark J. Cianchetti, David H. A...
ENTCS
2007
103views more  ENTCS 2007»
13 years 8 months ago
Policy-based Coordination in PAGODA: A Case Study
PAGODA (Policy And GOal Based Distributed Autonomy) is a modular architecture for specifying and prototyping autonomous systems. A PAGODA node (agent) interacts with its environme...
Carolyn L. Talcott
HICSS
2002
IEEE
79views Biometrics» more  HICSS 2002»
14 years 1 months ago
G-8 Collaborative Initiatives and the Digital Divide: Readiness for E-government
At the G-8 Kyushu-Okinawa Summit in July 2000, the industrialized nations acknowledged the advancement of the private sector in information technology (IT) and committed the organ...
Cheryl L. Brown