Sciweavers

988 search results - page 125 / 198
» Cryptographic access control in a distributed file system
Sort
View
HICSS
2005
IEEE
134views Biometrics» more  HICSS 2005»
15 years 5 months ago
Virtual Organizations as Normative Multiagent Systems
In this paper we propose a conceptual model of virtual organizations as normative multiagent systems. The dynamic aspects of virtual organizations are modeled using aspects of spe...
Guido Boella, Joris Hulstijn, Leendert W. N. van d...
TPDS
2010
117views more  TPDS 2010»
14 years 6 months ago
Reputation-Based Resource Allocation in P2P Systems of Rational Users
In this paper, we study p2p systems, where peers have to share their available resources between their own and other peers' needs. One such example is a system of peers who us...
Anna Satsiou, Leandros Tassiulas
JCM
2008
75views more  JCM 2008»
14 years 11 months ago
A Secure Mobile Agents Platform
Abstract--Mobile Agents is a new paradigm for distributed computing where security is very essential to the acceptance of this paradigm in a large scale distributed environment. In...
Leila Ismail
EDOC
2006
IEEE
15 years 5 months ago
Specifying and Controlling Multi-Channel Web Interfaces for Enterprise Applications
When building enterprise applications that need to be accessed through a variety of client devices, developers usually strive to implement most of the business logic device-indepen...
Matthias Book, Volker Gruhn
ICADL
2003
Springer
117views Education» more  ICADL 2003»
15 years 5 months ago
Metadata++: A Scalable Hierarchical Framework for Digital Libraries
: Metadata++ is a digital library system that we are developing to serve the needs of the United States Department of Agriculture Forest Service, the United States Department of th...
Mathew Weaver, Lois M. L. Delcambre, Timothy Tolle