Sciweavers

1462 search results - page 249 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
ICS
2004
Tsinghua U.
15 years 5 months ago
Adaptive incremental checkpointing for massively parallel systems
Given the scale of massively parallel systems, occurrence of faults is no longer an exception but a regular event. Periodic checkpointing is becoming increasingly important in the...
Saurabh Agarwal, Rahul Garg, Meeta Sharma Gupta, J...
AUTONOMICS
2008
ACM
15 years 1 months ago
Emergent engineering for the management of complex situations
Ubiquitous computing and communication environments connect systems and people in unprecedented ways, but also fundamentally challenge the mindset of traditional systems engineeri...
René Doursat, Mihaela Ulieru
ACSAC
2005
IEEE
15 years 5 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
IAAI
2001
15 years 1 months ago
TALPS: The T-AVB Automated Load Planning System
Due to military drawdowns and the need for additional transportation lift requirements, the US MARINE CORPS developed a concept wherein they had modified a commercial container sh...
Paul S. Cerkez
PERCOM
2010
ACM
15 years 3 months ago
Negotiate power and performance in the reality of RFID systems
—Recent years have witnessed the wide adoption of the RFID technology in many important application domains including logistics, inventory, retailing, public transportation, and ...
Xunteng Xu, Lin Gu, Jianping Wang, Guoliang Xing