Sciweavers

2912 search results - page 440 / 583
» Architecture for Providing Services in the Ubiquitous Comput...
Sort
View
IADIS
2004
15 years 3 months ago
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI
We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
Diana Berbecaru, Antonio Lioy
MASCOTS
2001
15 years 3 months ago
On Class-Based Isolation of UDP, Short-Lived and Long-Lived TCP Flows
The congestion control mechanisms of TCP make it vulnerable in an environment where flows with different congestionsensitivity compete for scarce resources. With the increasing am...
Selma Yilmaz, Ibrahim Matta
C5
2003
IEEE
15 years 6 months ago
A Conceptual Framework for Learning Experience Design
This paper describes our approach of utilizing a computational environment to apply a learner’s learning process as a first class object. With this approach, the learner’s le...
Kumiyo Nakakoji, Kazuaki Yamada, Yasuhiro Yamamoto...
SIGCOMM
2009
ACM
15 years 8 months ago
VL2: a scalable and flexible data center network
To be agile and cost effective, data centers should allow dynamic resource allocation across large server pools. In particular, the data center network should enable any server to...
Albert G. Greenberg, James R. Hamilton, Navendu Ja...
SOUPS
2009
ACM
15 years 8 months ago
flyByNight: mitigating the privacy risks of social networking
Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service provid...
Matthew M. Lucas, Nikita Borisov