Sciweavers

2365 search results - page 355 / 473
» Data access in distributed simulations of multi-agent system...
Sort
View
AINA
2007
IEEE
15 years 4 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
SCAM
2005
IEEE
15 years 3 months ago
Static Analysis for Computing Escapability and Mutability for Java Components
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Aiwu Shi, Gleb Naumovich
EUROPAR
2001
Springer
15 years 2 months ago
Using a Swap Instruction to Coalesce Loads and Stores
A swap instruction, which exchanges a value in memory with a value of a register, is available on many architectures. The primary application of a swap instruction has been for pro...
Apan Qasem, David B. Whalley, Xin Yuan, Robert van...
MSS
1999
IEEE
121views Hardware» more  MSS 1999»
15 years 2 months ago
Device Locks: Mutual Exclusion for Storage Area Networks
Device Locks are mechanisms used in distributed environments to facilitate mutual exclusion of shared resources. They can further be used to maintain coherence of data that is cac...
Kenneth W. Preslan, Steven R. Soltis, Christopher ...
I3
2007
14 years 11 months ago
OKKAM: Enabling a Web of Entities
Already in the early 14th century, the philosopher William of Ockham created the philosophical principle known as Ockham’s Razor, which can be translated from Latin as ”entiti...
Paolo Bouquet, Heiko Stoermer, Daniel Giacomuzzi