Sciweavers

1521 search results - page 278 / 305
» Role analysis
Sort
View
CCS
2001
ACM
14 years 2 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
CCS
2001
ACM
14 years 2 months ago
Taking the Copy Out of Copyright
Under current U.S. law and common understanding, the fundamental right granted by copyright is the right of reproduction – of making copies. Indeed, the very word “copyright”...
Ernest Miller, Joan Feigenbaum
CIKM
2001
Springer
14 years 2 months ago
X007: Applying 007 Benchmark to XML Query Processing Tool
If XML is to play the critical role of the lingua franca for Internet data interchange that many predict, it is necessary to start designing and adopting benchmarks allowing the c...
Stéphane Bressan, Gillian Dobbie, Zoé...
EVOW
2001
Springer
14 years 2 months ago
Evolution of Spiking Neural Controllers for Autonomous Vision-Based Robots
Abstract. We describe a set of preliminary experiments to evolve spiking neural controllers for a vision-based mobile robot. All the evolutionary experiments are carried out on phy...
Dario Floreano, Claudio Mattiussi
SIGCPR
2000
ACM
173views Hardware» more  SIGCPR 2000»
14 years 2 months ago
Hollywood: a business model for the future?
This paper elucidates an emergent theory of organizational structure, process and leadership which the author believes will characterize the Internet based workplace of the future...
Charles E. Grantham