Sciweavers

LICS
2003
IEEE
14 years 4 months ago
Logic in Access Control
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and ...
Martín Abadi
ACSC
2003
IEEE
14 years 4 months ago
Self-Adaptive Clock Synchronization Based on Clock Precision Difference
This paper presents an innovative strategy to synchronize all virtual clocks in asynchronous Internet environments. Our model is based on the architecture of one reference clock a...
Ying Zhao, Wanlei Zhou, Elicia Lanham, Shui Yu, Mi...
ACSC
2003
IEEE
14 years 4 months ago
Comparing Industry Benchmarks for J2EE Application Server : IBM's Trade2 vs Sun's ECperf
As the Internet and enterprise wide distributed systems become more prevalent in business IT systems, numerous advanced COTS (commercial off-the-shelf) middleware technologies hav...
Yan Zhang, Anna Liu, Wei Qu
ACSC
2003
IEEE
14 years 4 months ago
A Multi-versioning Algorithm for Intention Preservation in Distributed Real-time Group Editors
Intention preservation is an important aspect of consistency maintenance in real-time collaborative editing systems. The multi-version approach is able to preserve individual user...
Liyin Xue, Mehmet A. Orgun, Kang Zhang
ACSC
2003
IEEE
14 years 4 months ago
A Comparative Study for Domain Ontology Guided Feature Extraction
We introduced a novel method employing a hierarchical domain ontology structure to extract features representing documents in our previous publication (Wang 2002). All raw words i...
Bill B. Wang, Robert I. McKay, Hussein A. Abbass, ...
ACSC
2003
IEEE
14 years 4 months ago
Communication Performance Issues for Two Cluster Computers
Clusters of commodity machines have become a popular way of building cheap high performance parallel computers. Many of these designs rely on standard Ethernet networks as a syste...
Francis Vaughan, Duncan A. Grove, Paul D. Coddingt...
ACSC
2003
IEEE
14 years 4 months ago
A Practical Method to Counteract Denial of Service Attacks
Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to p...
Udaya Kiran Tupakula, Vijay Varadharajan
ACSC
2003
IEEE
14 years 4 months ago
A Web Based Environment for Learning to Program
The purpose of this paper is to describe in detail the current development status of the innovative Environment for Learning to Program (ELP) which provides an interactive web-bas...
Nghi Truong, Peter Bancroft, Paul Roe
ACSC
2003
IEEE
14 years 4 months ago
A Unifying Semantic Distance Model for Determining the Similarity of Attribute Values
The relative difference between two data values is of interest in a number of application domains including temporal and spatial applications, schema versioning, data warehousing...
John F. Roddick, Kathleen Hornsby, Denise de Vries
ACSC
2003
IEEE
14 years 4 months ago
Path-Planning by Tessellation of Obstacles
We describe two algorithms for static path-planning, with the aim of deriving the trajectory that always maximises the distance of the path from the nearest obstacle. The bubble a...
Tane Pendragon, R. Lyndon While