Sciweavers

1033 search results - page 160 / 207
» A tightly coupled approach to design and data management
Sort
View
FAST
2008
15 years 17 hour ago
SWEEPER: An Efficient Disaster Recovery Point Identification Mechanism
Data corruption is one of the key problems that is on top of the radar screen of most CIOs. Continuous Data Protection (CDP) technologies help enterprises deal with data corruptio...
Akshat Verma, Kaladhar Voruganti, Ramani Routray, ...
INTERACTION
2009
ACM
15 years 2 months ago
RoboEarth: connecting robots worldwide
In this paper, we present the core concept and the benefits of an approach called RoboEarth which will be highly beneficial for future robotic applications in science and industry...
Oliver Zweigle, René van de Molengraft, Raf...
IH
2001
Springer
15 years 2 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
FGCS
2007
142views more  FGCS 2007»
14 years 9 months ago
Fault tolerant high performance Information Services for dynamic collections of Grid and Web services
Abstract. E-Science Semantic Grids can often be thought of as dynamic collection of semantic subgrids where each subgrid is a collection of modest number of services that assembled...
Mehmet S. Aktas, Geoffrey Fox, Marlon E. Pierce
67
Voted
NSPW
2003
ACM
15 years 2 months ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin