Sciweavers

381 search results - page 43 / 77
» A computational framework for package planning
Sort
View
NDSS
1997
IEEE
15 years 1 months ago
Distributed Authentication in Kerberos Using Public Key Cryptography
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authenticati...
Marvin A. Sirbu, John C.-I. Chuang
WSE
2005
IEEE
15 years 3 months ago
Towards Evolving Web Sites into Grid Services Environment
Grid services are emerged by integrating Grid computing and Web services to perform a seamless information processing system across distributed, heterogeneous, dynamic virtual org...
Jianzhi Li, Hongji Yang
IJCAI
2001
14 years 11 months ago
IBAL: A Probabilistic Rational Programming Language
In a rational programming language, a program specifies a situation faced by an agent; evaluating the program amounts to computing what a rational agent would believe or do in the...
Avi Pfeffer
SIGMOD
2003
ACM
136views Database» more  SIGMOD 2003»
15 years 10 months ago
A Characterization of the Sensitivity of Query Optimization to Storage Access Cost Parameters
Most relational query optimizers make use of information about the costs of accessing tuples and data structures on various storage devices. This information can at times be off b...
Frederick Reiss, Tapas Kanungo
NPC
2004
Springer
15 years 3 months ago
LEAPS: A Location Estimation and Action Prediction System in a Wireless LAN Environment
Abstract. Location estimation and user behavior recognition are research issues that go hand in hand. In the past, these two issues have been investigated separately. In this paper...
Qiang Yang, Yiqiang Chen, Jie Yin, Xiaoyong Chai