Sciweavers

470 search results - page 86 / 94
» A Component and Communication Model for Push Systems
Sort
View
FASE
2009
Springer
15 years 6 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
PAKDD
2007
ACM
184views Data Mining» more  PAKDD 2007»
15 years 5 months ago
Exploring Group Moving Pattern for an Energy-Constrained Object Tracking Sensor Network
In this paper, we investigate and utilize the characteristic of the group movement of objects to achieve energy conservation in the inherently resource-constrained wireless object ...
Hsiao-Ping Tsai, De-Nian Yang, Wen-Chih Peng, Ming...
SIGMETRICS
2006
ACM
168views Hardware» more  SIGMETRICS 2006»
15 years 5 months ago
Throughput performance of popular JMS servers
The Java Messaging Service (JMS) facilitates communication among distributed software components according to the publish/subscribe principle. If the subscribers install filter r...
Michael Menth, Robert Henjes, Christian Zepfel, Se...
HIPS
1998
IEEE
15 years 4 months ago
Language Bindings for a Data-Parallel Runtime
The NPAC kernel runtime, developed in the PCRC Parallel Compiler Runtime Consortium project, is a runtime library with special support for the High Performance Fortran data model....
Bryan Carpenter, Geoffrey Fox, Donald Leskiw, Xiao...
JCP
2008
216views more  JCP 2008»
14 years 11 months ago
Direct Anonymous Attestation for Next Generation TPM
Trusted computing platforms have been proposed as a promising approach to enhance the security of general-purpose computing systems. Direct Anonymous Attestation(DAA) is a scheme t...
Xiaofeng Chen 0004, Dengguo Feng