Sciweavers

735 search results - page 94 / 147
» Remote System Management Principles
Sort
View
WMPI
2004
ACM
14 years 3 months ago
Evaluating kilo-instruction multiprocessors
The ever increasing gap in processor and memory speeds has a very negative impact on performance. One possible solution to overcome this problem is the Kilo-instruction processor. ...
Marco Galluzzi, Ramón Beivide, Valentin Pue...
ICRA
2003
IEEE
166views Robotics» more  ICRA 2003»
14 years 3 months ago
A service-based network architecture for wearable robots
We are developing a network architecture for our novel robot concept of wearable robot. Wearable robots are mobile information devices capable of supporting remote communication a...
Ka Keung Lee, Ping Zhang, Yangsheng Xu
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
14 years 2 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
GPC
2008
Springer
13 years 11 months ago
Middleware Integration and Deployment Strategies for Cyberinfrastructures
Virtual Organizations require infrastructure that meets their scientific needs. Traditionally, a VO can require access to computational backends that are suited for interactive app...
Sebastien Goasguen, Krishna Madhavan, David Wolins...
IJNSEC
2006
143views more  IJNSEC 2006»
13 years 10 months ago
Password Authentication Schemes: Current Status and Key Issues
Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang