Sciweavers

2250 search results - page 140 / 450
» Authorizing applications in singularity
Sort
View
ACSAC
2000
IEEE
15 years 2 months ago
Personal Security Environment on Palm PDA
Digital signature schemes are based on the assumption that the signing key is kept in secret. Ensuring that this assumption holds is one of the most crucial problems for all curre...
Margus Freudenthal, S. Heiberg, Jan Willemson
FTDCS
1999
IEEE
15 years 2 months ago
Lessons Learned from Building a Web-Based Spatial Data Discovery Facility
This paper discusses the lessons learned and decisions made while designing and developing a web-based application for the National Spatial Information Framework (NSIF) of South A...
Ferdie Danzfuss, Judith Bishop
GRID
2000
Springer
15 years 1 months ago
Web Enabled Client-Server Model for Development Environment of Distributed Image Processing
Image processing applications (IPA) requirements can be best met by using the distributed environment. The authors had developed an environment over a network of VAX/VMS and Unix f...
Haresh S. Bhatt, V. H. Patel, Akshai K. Aggarwal
CSSE
2002
IEEE
14 years 10 months ago
A fault tolerant access to legacy database systems using CORBA technology
This work presents a software-implemented fault tolerance approach for building a reliable database application in a CORBA environment. Database applications have functional requi...
Domenico Cotroneo, Nicola Mazzocca, Luigi Romano, ...
CHI
2009
ACM
15 years 10 months ago
Sacred imagery in techno-spiritual design
Despite increased knowledge about how Information and Communications Technologies (ICTs) are used to support religious and spiritual practices, designers know little about how to ...
Susan Wyche, Kelly E. Caine, Benjamin K. Davison, ...