Sciweavers

7992 search results - page 1308 / 1599
» Communication Abstractions for Distributed Systems
Sort
View
TCSV
2008
298views more  TCSV 2008»
15 years 5 months ago
TrustStream: A Secure and Scalable Architecture for Large-Scale Internet Media Streaming
Abstract--To effectively address the explosive growth of multimedia applications over the Internet, a large-scale media streaming system has to fully take into account the issues o...
Hao Yin, Chuang Lin, Qian Zhang, Zhijia Chen, Dape...
169
Voted
SACMAT
2010
ACM
15 years 10 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
SOSP
2003
ACM
16 years 1 months ago
Xen and the art of virtualization
Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity ...
Paul Barham, Boris Dragovic, Keir Fraser, Steven H...
LISA
1994
15 years 6 months ago
The Group Administration Shell and the GASH Network Computing Environment
Managing large scale UNIX networks so that users can use resources on multiple systems is traditionally performed using NIS, NFS, and DNS. Proper use of these tools requires exact...
Jonathan Abbey
CHI
2008
ACM
16 years 5 months ago
Asynchronous remote medical consultation for Ghana
Computer-mediated communication systems can be used to bridge the gap between doctors in underserved regions with local shortages of medical expertise and medical specialists worl...
Rowena Luk, Melissa Ho, Paul M. Aoki
« Prev « First page 1308 / 1599 Last » Next »