Sciweavers

1224 search results - page 31 / 245
» A Distributed Implementation of the Certified Information Ac...
Sort
View
IJNSEC
2006
80views more  IJNSEC 2006»
14 years 11 months ago
Authenticated Access to Reserved Network Resources
Enhanced network services often involve preferential allocation of resources such as transmission capacity ("bandwidth") and buffer space to packets belonging to certain...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
SIGMOD
2010
ACM
249views Database» more  SIGMOD 2010»
15 years 4 months ago
Active knowledge: dynamically enriching RDF knowledge bases by web services
The proliferation of knowledge-sharing communities and the advances in information extraction have enabled the construction of large knowledge bases using the RDF data model to re...
Nicoleta Preda, Gjergji Kasneci, Fabian M. Suchane...
GEOINFO
2004
15 years 1 months ago
Design and Implementation Issues for Explorative Location-based Applications: The NexusRallye
: Explorative Location-based Applications (eLBA), define a new class of applications that rely on both positioning (i.e. location information) and georeferenced information in addi...
Daniela Nicklas, Nicola Hönle, Michael Molten...
ICMCS
1999
IEEE
158views Multimedia» more  ICMCS 1999»
15 years 4 months ago
DVS: A System for Distribution and Management of Global Video on Demand Services
The Distributed Video Server (DVS) system provides a comprehensive solution for the management and distribution of a major future electronic commodity service, Video on Demand (VO...
Alexey Roytman, Israel Ben-Shaul, Israel Cidon
SACMAT
2011
ACM
14 years 2 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali