Sciweavers

1282 search results - page 242 / 257
» A Distributed Certification System for Structured P2P Networ...
Sort
View
88
Voted
PERCOM
2003
ACM
15 years 11 months ago
Smart Identification Frameworks for Ubiquitous Computing Applications
Abstract. We present our results of the conceptual design and the implementation of ubiquitous computing applications using smart identification technologies. First, we describe su...
Friedemann Mattern, Kay Römer, Thomas Dü...
87
Voted
SIGCSE
2008
ACM
155views Education» more  SIGCSE 2008»
14 years 11 months ago
Towards a top-down approach to teaching an undergraduate grid computing course
Early undergraduate Grid computing courses generally took a bottom-up approach to Grid computing education starting with network protocols, client-server concepts, creating Web an...
Barry Wilkinson, Clayton Ferner
SACMAT
2003
ACM
15 years 4 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
HT
2004
ACM
15 years 5 months ago
Hypertext versioning for embedded link models
In this paper, we describe Chrysant, a hypertext version control system for embedded link models. Chrysant provides generalpurpose versioning capability to hypertext systems with ...
Kai Pan, E. James Whitehead Jr., Guozheng Ge
KDD
2008
ACM
174views Data Mining» more  KDD 2008»
16 years 1 days ago
Effective label acquisition for collective classification
Information diffusion, viral marketing, and collective classification all attempt to model and exploit the relationships in a network to make inferences about the labels of nodes....
Mustafa Bilgic, Lise Getoor