Sciweavers

43264 search results - page 8180 / 8653
» Comparing models of computation
Sort
View
129
Voted
DOLAP
2004
ACM
15 years 9 months ago
Aggregate queries in peer-to-peer OLAP
A peer-to-peer (P2P) data management system consists essentially of a network of peer systems, each maintaining full autonomy over its own data resources. Data exchange between pe...
Mauricio Minuto Espil, Alejandro A. Vaisman
ISLPED
2004
ACM
119views Hardware» more  ISLPED 2004»
15 years 9 months ago
Application-level prediction of battery dissipation
Mobile, battery-powered devices such as personal digital assistants and web-enabled mobile phones have successfully emerged as new access points to the world’s digital infrastru...
Chandra Krintz, Ye Wen, Richard Wolski
MOBICOM
2004
ACM
15 years 9 months ago
Detecting and correcting malicious data in VANETs
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks (VANETs) must rely heavily on node-to-node communication, thus allowing for malicious data t...
Philippe Golle, Daniel H. Greene, Jessica Staddon
SACMAT
2004
ACM
15 years 9 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
124
Voted
SACMAT
2004
ACM
15 years 9 months ago
Role-based cascaded delegation
We propose role-based cascaded delegation, a model for delegation of authority in decentralized trust management systems. We show that role-based cascaded delegation combines the ...
Roberto Tamassia, Danfeng Yao, William H. Winsboro...
« Prev « First page 8180 / 8653 Last » Next »