Sciweavers

2024 search results - page 369 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
ICFEM
2009
Springer
14 years 3 months ago
Combining Static Model Checking with Dynamic Enforcement Using the Statecall Policy Language
Internet protocols encapsulate a significant amount of state, making implementing the host software complex. In this paper, we define the Statecall Policy Language (SPL) which pr...
Anil Madhavapeddy
SIGMETRICS
2002
ACM
159views Hardware» more  SIGMETRICS 2002»
13 years 8 months ago
Limits of wide-area thin-client computing
While many application service providers have proposed using thin-client computing to deliver computational services over the Internet, little work has been done to evaluate the e...
Albert M. Lai, Jason Nieh
CANDC
2009
ACM
14 years 18 days ago
Computational and cognitive infrastructures of stigma: empowering identity in social computing and gaming
Computing technologies such as games, social networking sites, and virtual environments often reproduce forms of social stigma encountered in everyday real life, as well as introd...
D. Fox Harrell
AICT
2006
IEEE
225views Communications» more  AICT 2006»
13 years 10 months ago
Migration to 4 G: Mobile IP based Solutions
Fourth Generation (4G) is the next generation of wireless networks that will replace third Generation (3G) networks sometimes in future. 4G is intended to provide high speed, high...
K. R. Santhi, G. Senthil Kumaran
LOCA
2005
Springer
14 years 2 months ago
Classifying the Mobility of Users and the Popularity of Access Points
Abstract. There is increasing interest in location-aware systems and applications. It is important for any designer of such systems and applications to understand the nature of use...
Minkyong Kim, David Kotz