Sciweavers

13863 search results - page 2646 / 2773
» Providing Database as a Service
Sort
View
ATAL
2004
Springer
15 years 10 months ago
Adaptive Information Infrastructures for the e-Society
Abstract. Positioned at the confluence between human/machine and hardware/software integration and backed by a solid proof of concept realized through several scenarios encompassin...
Mihaela Ulieru
CBSE
2004
Springer
15 years 10 months ago
Extra-Functional Contract Support in Components
According to Szyperski, “a software component is a unit of composition with contractually specified interfaces and explicit context dependencies only”. But it is well known tha...
Olivier Defour, Jean-Marc Jézéquel, ...
CCS
2004
ACM
15 years 10 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
ESAS
2004
Springer
15 years 10 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
EUSAI
2004
Springer
15 years 10 months ago
QoS Provision Using Dual RF Modules in Wireless LAN
With the rapid growth of emerging demand and deployment of wireless LAN (WLAN), much of traffic including multimedia traffic is forced to travel over WLAN. Since the legacy IEEE 80...
Sang-Hee Park, Hye-Soo Kim, Chun-Su Park, Kyunghun...
« Prev « First page 2646 / 2773 Last » Next »