Sciweavers

132 search results - page 3 / 27
» A method for access authorisation through delegation network...
Sort
View
EUROSYS
2010
ACM
13 years 11 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
JIT
2005
Springer
134views Database» more  JIT 2005»
13 years 11 months ago
MAGI - Mobile Access to Grid Infrastructure: Bringing the gifts of Grid to Mobile Computing
: Access to Grid services is currently limited to devices having significant computing, network resources etc. such as desktop computers. On the other hand, most of mobile devices ...
Ali Sajjad, Hassan Jameel, Umar Kalim, Young-Koo L...
IM
1997
13 years 7 months ago
Active Objects in TMN
Telecommunications Management Network (TMN) systems use the object-oriented information modelling techniques and communication facilities provided by OSI Systems Management (SM). ...
Anastasia Vassila, George Pavlou, Graham Knight
PERCOM
2008
ACM
13 years 6 months ago
Composing software services in the pervasive computing environment: Languages or APIs?
The pervasive computing environment will be composed of heterogeneous services. In this work, we have explored how a domain specific language for service composition can be implem...
Jon Robinson, Ian Wakeman, Dan Chalmers
AINA
2010
IEEE
13 years 3 months ago
Neural Network Trainer through Computer Networks
- This paper introduces a neural network training tool through computer networks. The following algorithms, such as neuron by neuron (NBN) [1][2], error back propagation (EBP), Lev...
Nam Pham, Hao Yu, Bogdan M. Wilamowski