Sciweavers

445 search results - page 55 / 89
» Authorization and Access Control in IRO-DB
Sort
View
ISLPED
2006
ACM
109views Hardware» more  ISLPED 2006»
15 years 3 months ago
Power reduction of multiple disks using dynamic cache resizing and speed control
This paper presents an energy-conservation method for multiple disks and their cache memory. Our method periodically resizes the cache memory and controls the rotation speeds unde...
Le Cai, Yung-Hsiang Lu
ITRUST
2005
Springer
15 years 3 months ago
Interactive Credential Negotiation for Stateful Business Processes
Business Processes for Web Services are the new paradigm for lightweight enterprise integration. They cross organizational boundaries, are provided by entities that see each other ...
Hristo Koshutanski, Fabio Massacci
FGCS
2006
88views more  FGCS 2006»
14 years 9 months ago
Token based networking: Experiment NL-101
This short communication outlines an experiment where tokens, associated with application oriented IP streams, authorize access to an optical lightpath during iGrid 2005. The expe...
Leon Gommans, Bas van Oudenaarde, Alfred Wan, Cees...
ECOOPW
1998
Springer
15 years 1 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
SI3D
2005
ACM
15 years 3 months ago
User interfaces for interactive control of physics-based 3D characters
We present two user interfaces for the interactive control of dynamically-simulated characters. The first interface uses an ‘action palette’ and targets sports prototyping ap...
Peng Zhao, Michiel van de Panne