Sciweavers

6303 search results - page 925 / 1261
» A Generated Management for Distributed Systems
Sort
View
SWS
2004
ACM
15 years 10 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
AMEC
2004
Springer
15 years 10 months ago
Agents' Strategies for the Dual Parallel Search in Partnership Formation Applications
In many two-sided search applications, autonomous agents can enjoy the advantage of parallel search, powered by their ability to handle an enormous amount of information, in a shor...
David Sarne, Sarit Kraus
PACS
2004
Springer
172views Hardware» more  PACS 2004»
15 years 10 months ago
Safe Overprovisioning: Using Power Limits to Increase Aggregate Throughput
Management of power in data centers is driven by the need to not exceed circuit capacity. The methods employed in the oversight of these power circuits are typically static and ad...
Mark E. Femal, Vincent W. Freeh
EUROPAR
2003
Springer
15 years 10 months ago
Preventive Multi-master Replication in a Cluster of Autonomous Databases
We consider the use of a cluster of PC servers for Application Service Providers where applications and databases must remain autonomous. We use data replication to improve data av...
Esther Pacitti, M. Tamer Özsu, Cédric ...
ICADL
2003
Springer
149views Education» more  ICADL 2003»
15 years 9 months ago
Approximating Fair Use in LicenseScript
Current rights management systems are not able to enforce copyright laws because of both legal and technological reasons. The contract rights granted by a copyright owner are often...
Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel,...