Sciweavers

6667 search results - page 1301 / 1334
» Applications At Your Service
Sort
View
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
15 years 3 months ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni
CSFW
2004
IEEE
15 years 3 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell
DASFAA
2004
IEEE
86views Database» more  DASFAA 2004»
15 years 3 months ago
Supporting Exploratory Queries in Databases
Users of database applications, especially in the e-commerce domain, often resort to exploratory "trial-and-error" queries since the underlying data space is huge and unf...
Abhijit Kadlag, Amol V. Wanjari, Juliana Freire, J...
EDBT
2006
ACM
156views Database» more  EDBT 2006»
15 years 3 months ago
FlexInd: A Flexible and Parameterizable Air-Indexing Scheme for Data Broadcast Systems
Abstract. In wireless data broadcast systems, popular information is repetitively disseminated through possibly multiple communication channels to mobile clients using various type...
André Seifert, Jen-Jou Hung
EMSOFT
2006
Springer
15 years 3 months ago
Multi-level software reconfiguration for sensor networks
In-situ reconfiguration of software is indispensable in embedded networked sensing systems. It is required for re-tasking a deployed network, fixing bugs, introducing new features...
Rahul Balani, Chih-Chieh Han, Ram Kumar Rengaswamy...
« Prev « First page 1301 / 1334 Last » Next »