Sciweavers

871 search results - page 64 / 175
» A Decentralized Authorization Architecture
Sort
View
CN
2007
172views more  CN 2007»
14 years 9 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
C5
2006
IEEE
15 years 3 months ago
A Language Supporting Direct Manipulation of Component-based Object Construction and Deconstruction in Collaborative Croquet Spa
We describe the language architecture of Brie, a framework for authoring 3D spaces and user interfaces. Brie is designed to take advantage of the unique social characteristics of ...
Howard Stearns, Joshua Gargus, Martin Schuetze
WWW
2006
ACM
15 years 10 months ago
Rapid prototyping of web applications combining domain specific languages and model driven design
There have been several authoring methods proposed in the literature that are model based, essentially following the Model Driven Design philosophy. While useful, such methods nee...
Demetrius Arraes Nunes, Daniel Schwabe
WIKIS
2009
ACM
15 years 4 months ago
Wiki credibility enhancement
Wikipedia has been very successful as an open encyclopedia which is editable by anybody. However, the anonymous nature of Wikipedia means that readers may have less trust since th...
Felix Halim, Yongzheng Wu, Roland H. C. Yap
NOMS
2008
IEEE
139views Communications» more  NOMS 2008»
15 years 4 months ago
Harmonizing service and network provisioning for federative access in a mobile environment
—In this paper we propose an integrated platform to power the symbiosis between networks and services whilst supporting mobility of users. This platform is based on methods for a...
David J. Lutz, Patrick Mandic, Sascha Neinert, Rut...