Sciweavers

603 search results - page 21 / 121
» Agilent's Key Technologies in Remote System Management
Sort
View
COOPIS
2000
IEEE
15 years 4 months ago
An Evaluation of the Java-Based Approaches to Web Database Access
Given the undeniable popularity of the Web, providing efficient and secure access to remote databases using a Web browser is crucial for the emerging cooperative information system...
Stavros Papastavrou, Panos K. Chrysanthis, George ...
IMC
2009
ACM
15 years 6 months ago
When private keys are public: results from the 2008 Debian OpenSSL vulnerability
We report on the aftermath of the discovery of a severe vulnerability in the Debian Linux version of OpenSSL. Systems affected by the bug generated predictable random numbers, mo...
Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon...
ICEIS
2003
IEEE
15 years 5 months ago
A Multi-Level Architecture for Distributed Object Bases
Abstract: The work described in this article arises from two needs. First, there is still a need for providing more sophisticated database systems than just relational ones. Second...
Markus Kirchberg, Klaus-Dieter Schewe, Alexei Tret...
CRITIS
2006
15 years 3 months ago
Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
It is commonly agreed that Wireless Sensor Networks (WSN) is one of the technologies that better fulfills features like the ones required by Critical (Information) Infrastructures....
Cristina Alcaraz, Rodrigo Roman
102
Voted
HPDC
2003
IEEE
15 years 5 months ago
Resource-Aware Stream Management with the Customizable dproc Distributed Monitoring Mechanisms
Monitoring the resources of distributed systems is essential to the successful deployment and execution of grid applications, particularly when such applications have welldefined...
Sandip Agarwala, Christian Poellabauer, Jiantao Ko...