Sciweavers

341 search results - page 55 / 69
» A dynamic key management solution to access hierarchy
Sort
View
SISW
2005
IEEE
15 years 3 months ago
The Consequences of Decentralized Security in a Cooperative Storage System
Traditional storage systems have considered security as a problem to be solved at the perimeter: once a user is authenticated, each device internal to the system trusts the decisi...
Douglas Thain, Christopher Moretti, Paul Madrid, P...
ICDE
2006
IEEE
201views Database» more  ICDE 2006»
15 years 11 months ago
Counting at Large: Efficient Cardinality Estimation in Internet-Scale Data Networks
Counting in general, and estimating the cardinality of (multi-) sets in particular, is highly desirable for a large variety of applications, representing a foundational block for ...
Nikos Ntarmos, Peter Triantafillou, Gerhard Weikum
93
Voted
INFOCOM
1998
IEEE
15 years 1 months ago
An Error Control Scheme for Large-Scale Multicast Applications
Retransmission based error control for large scale multicast applications is difficult because of implosion and exposure. Existing schemes (SRM, RMTP, TMTP, LBRRM) have good solut...
Christos Papadopoulos, Guru M. Parulkar, George Va...
96
Voted
JNW
2007
149views more  JNW 2007»
14 years 9 months ago
Adaptive Semantic Middleware for Mobile Environments
— Context-awareness is considered a key driving principle for the design and provisioning of adaptable pervasive services. Rightfully describing and interpreting context, however...
Antonio Corradi, Rebecca Montanari, Alessandra Ton...
POLICY
2007
Springer
15 years 3 months ago
Proteus: A Semantic Context-Aware Adaptive Policy Model
The growing diffusion of portable devices enables users to benefit from anytime and anywhere impromptu collaboration. Appropriate policy models that take into account the dynamici...
Alessandra Toninelli, Rebecca Montanari, Lalana Ka...