Sciweavers

231 search results - page 16 / 47
» Authentication across heterogeneous networks
Sort
View
PERCOM
2006
ACM
15 years 9 months ago
Omero: Ubiquitous User Interfaces in the Plan B Operating System
It is difficult to build user interfaces that must be distributed over a set of dynamic and heterogeneous I/O devices. This difficulty increases when we want to split, merge, repl...
Francisco J. Ballesteros, Gorka Guardiola Muzquiz,...
SIS
2008
14 years 11 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
ICDE
1997
IEEE
92views Database» more  ICDE 1997»
15 years 11 months ago
Distributing Semantic Constraints Between Heterogeneous Databases
In recent years, research about distributing databases over networks has become increasingly important. Here we concentrate on the issues of interoperability of heterogeneous DBMS...
Stefan Grufman, Fredrik Samson, Suzanne M. Embury,...
77
Voted
ICCS
2004
Springer
15 years 3 months ago
Using Web Services to Integrate Heterogeneous Simulations in a Grid Environment
The distributed information technologies collectively known as Web services recently have demonstrated powerful capabilities for scalable interoperation of heterogeneous software a...
J. Mark Pullen, Ryan Brunton, Donald P. Brutzman, ...
SPE
2002
141views more  SPE 2002»
14 years 9 months ago
Data collection and restoration for heterogeneous process migration
This study presents a practical solution for data collection and restoration to migrate a process written in high level stack-based languages such as C and Fortran over a network ...
Kasidit Chanchio, Xian-He Sun