Sciweavers

1006 search results - page 147 / 202
» What is this page known for
Sort
View
WPES
2003
ACM
14 years 2 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
ATAL
2003
Springer
14 years 2 months ago
Capturing agent autonomy in roles and XML
A key question in the field of agent-oriented software engineering is how the kind and extent of autonomy owned by computational agents can be appropriately captured. As long as ...
Gerhard Weiß, Michael Rovatsos, Matthias Nic...
BTW
2003
Springer
103views Database» more  BTW 2003»
14 years 1 months ago
XPath-Aware Chunking of XML-Documents
Dissemination systems are used to route information received from many publishers individually to multiple subscribers. The core of a dissemination system consists of an efficient...
Wolfgang Lehner, Florian Irmert
EGOV
2003
Springer
14 years 1 months ago
Implementing e-Government in Spain
: New information and communication technologies within the Administration give rise to a series of important challenges: to select and use the various telematic and computer-relat...
José Luis Bermejo Latre
CLOUD
2010
ACM
14 years 1 months ago
Differential virtual time (DVT): rethinking I/O service differentiation for virtual machines
This paper investigates what it entails to provide I/O service differentiation and performance isolation for virtual machines on individual multicore nodes in cloud platforms. Sh...
Mukil Kesavan, Ada Gavrilovska, Karsten Schwan