Sciweavers

3507 search results - page 602 / 702
» Specialized execution environments
Sort
View
DAIS
2007
13 years 11 months ago
Scalable Processing of Context Information with COSMOS
Abstract. Ubiquitous computing environments are characterised by a high number of heterogenous devices that generate a huge amount of context data. These data are used, for example...
Denis Conan, Romain Rouvoy, Lionel Seinturier
ICISC
2008
89views Cryptology» more  ICISC 2008»
13 years 11 months ago
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Group key agreement (GKA) allows a set of players to establish a shared secret and thus bootstrap secure group communication. GKA is very useful in many types of peer group scenar...
Jihye Kim, Gene Tsudik
ICWS
2007
IEEE
13 years 11 months ago
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions
Security enforcement framework is an important aspect of any distributed system. With new requirements imposed by SOA-based business models, adaptive security enforcement on the a...
Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitr...
IQ
2007
13 years 11 months ago
Data Integration Schema Analysis: An Approach With Information Quality
: Integrated access to distributed data is an important problem faced in many scientific and commercial applications. A data integration system provides a unified view for users to...
Maria da Conceição Moraes Batista, A...
OPODIS
2008
13 years 11 months ago
Computing and Updating the Process Number in Trees
The process number is the minimum number of requests that have to be simultaneously disturbed during a routing reconfiguration phase of a connection oriented network. From a graph ...
David Coudert, Florian Huc, Dorian Mazauric