Sciweavers

2061 search results - page 114 / 413
» Authorization for Metacomputing Applications
Sort
View
DATE
2007
IEEE
114views Hardware» more  DATE 2007»
15 years 10 months ago
Performance aware secure code partitioning
Many embedded applications exist where decisions are made using sensitive information. A critical issue in such applications is to ensure that data is accessed only by authorized ...
Sri Hari Krishna Narayanan, Mahmut T. Kandemir, Ri...
SEMWEB
2009
Springer
15 years 10 months ago
TripleRank: Ranking Semantic Web Data by Tensor Decomposition
Abstract. The Semantic Web fosters novel applications targeting a more efficient and satisfying exploitation of the data available on the web, e.g. faceted browsing of linked open...
Thomas Franz, Antje Schultz, Sergej Sizov, Steffen...
IEEESCC
2007
IEEE
15 years 10 months ago
Design Principles for B2B Services - An Evaluation of Two Alternative Service Designs
A service-oriented architecture (SOA) promises a more flexible intra- and interorganizational integration of heterogeneous application systems. The central design element of a SOA...
Christine Legner, Tobias Vogel
120
Voted
ACSAC
2000
IEEE
15 years 8 months ago
Personal Security Environment on Palm PDA
Digital signature schemes are based on the assumption that the signing key is kept in secret. Ensuring that this assumption holds is one of the most crucial problems for all curre...
Margus Freudenthal, S. Heiberg, Jan Willemson
FTDCS
1999
IEEE
15 years 8 months ago
Lessons Learned from Building a Web-Based Spatial Data Discovery Facility
This paper discusses the lessons learned and decisions made while designing and developing a web-based application for the National Spatial Information Framework (NSIF) of South A...
Ferdie Danzfuss, Judith Bishop