Sciweavers

1266 search results - page 23 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
WISA
2004
Springer
14 years 1 months ago
Inconsistency Detection of Authorization Policies in Distributed Component Environment
In distributed component environment, a Role-Based Access Control (RBAC) server manages all authorization policies of components in the same domains whereas the components are dist...
Chang-Joo Moon, Hoh Peter In
AICCSA
2008
IEEE
301views Hardware» more  AICCSA 2008»
13 years 10 months ago
Cooperative criminal face recognition in distributed web environment
This paper presents a multi-agent framework for distributed web-based face recognition using fuzzy logic based result fusion mechanism. The model is designed in JADE framework and...
Hamid Tabatabaee Yazdi, Amin Milani Fard, Mohammad...
CASCON
1996
126views Education» more  CASCON 1996»
13 years 9 months ago
Evaluating the costs of management: a distributed applications management testbed
In today's distributed computing environments, users are makingincreasing demands on the systems, networks, and applications they use. Users are coming to expect performance,...
Michael Katchabaw, Stephen L. Howard, Andrew D. Ma...
HCW
1998
IEEE
14 years 20 days ago
Implementing Distributed Synthetic Forces Simulations in Metacomputing Environments
A distributed, parallel implementation of the widely used Modular Semi-Automated Forces ModSAF Distributed Interactive Simulation DIS is presented, with Scalable Parallel Processo...
Sharon Brunett, Dan Davis, Thomas Gottschalk, Paul...
EEE
2004
IEEE
14 years 4 days ago
Secure Online Examination Architecture Based on Distributed Firewall
Online (Web-based) examination is an effective solution for mass education evaluation. However, due to the incomplete of network security, students can communicate with each other...
Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee