Sciweavers

988 search results - page 107 / 198
» Cryptographic access control in a distributed file system
Sort
View
DATE
2002
IEEE
94views Hardware» more  DATE 2002»
15 years 4 months ago
E-Design Based on the Reuse Paradigm
This paper gives an overview on a Virtual electronic component or IP (Intellectual Property) exchange infrastructure whose main components are a XML "well structured IP e-cat...
L. Ghanmi, A. Ghrab, M. Hamdoun, B. Missaoui, K. S...
OWLED
2008
15 years 1 months ago
Managing Change: An Ontology Version Control System
In this paper we present the basic requirements and initial design of a system which manages and facilitates changes to an OWL ontology in a multi-editor environment. This system u...
Timothy Redmond, Michael Smith, Nick Drummond, Tan...
DOA
2001
94views more  DOA 2001»
15 years 1 months ago
How to Monitor and Control Resource Usage in Mobile Agent Systems
The Mobile Agent technology has already shown its advantages, but at the same time has already remarked new problems currently limiting its diffusion in commercial environments. A...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
AINA
2004
IEEE
15 years 3 months ago
An Overlay Network Architecture for Data Placement Strategies in a P2P Streaming Network
Abstract--Generic file sharing P2P applications have gained high popularity in the past few years. In particular P2P streaming architectures have attracted attention. Some of them ...
Kan Hung Wan, Chris Loeser
WCNC
2008
IEEE
15 years 6 months ago
Analysis of Distributed Reservation Protocol for UWB-Based WPANs with ECMA-368 MAC
— The recent ECMA-368 standard specifies the use of ultra wideband (UWB) technology for high rate communications in wireless personal area networks (WPANs). This paper proposes ...
Nasim Arianpoo, Yuxia Lin, Vincent W. S. Wong, Att...