Sciweavers

209 search results - page 42 / 42
» Performance of Different Proxy Concepts in UMTS Networks
Sort
View
USS
2008
13 years 7 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
EDBT
2010
ACM
185views Database» more  EDBT 2010»
13 years 6 months ago
Probabilistic threshold k nearest neighbor queries over moving objects in symbolic indoor space
The availability of indoor positioning renders it possible to deploy location-based services in indoor spaces. Many such services will benefit from the efficient support for k n...
Bin Yang 0002, Hua Lu, Christian S. Jensen
JVM
2004
132views Education» more  JVM 2004»
13 years 6 months ago
Solaris Zones: Operating System Support for Server Consolidation
e a new operating system abstraction for partitioning systems, allowing multiple applications to run in isolation from each other on the same physical hardware. This isolation prev...
Andrew Tucker, David Comay
WM
2003
13 years 6 months ago
Experience Management within Project Management Processes
: The business process revolution has had two impacts on project management: the recognition of a process perspective (such as the 39 appearing in the PMBOK), and the acknowledgeme...
Maya Kaner, Reuven Karni