Sciweavers

10396 search results - page 1886 / 2080
» Deployment Support Network
Sort
View
90
Voted
SAC
2006
ACM
15 years 7 months ago
Evaluating unstructured peer-to-peer lookup overlays
Unstructured peer-to-peer lookup systems incur small constant overhead per single join or leave operation, and can easily support keyword searches. Hence, they are suitable for dy...
Idit Keidar, Roie Melamed
109
Voted
SWS
2006
ACM
15 years 7 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch
VALUETOOLS
2006
ACM
141views Hardware» more  VALUETOOLS 2006»
15 years 7 months ago
A realistic simulation of internet-scale events
Internet-scale security incidents are becoming increasingly common, and the researchers need tools to replicate and study them in a controlled setting. Current network simulators,...
Songjie Wei, Jelena Mirkovic
88
Voted
VRST
2006
ACM
15 years 7 months ago
Media productions for a dome display system
As the interest of the public for new forms of media grows, museums and theme parks select real time Virtual Reality productions as their presentation medium. Based on threedimens...
Athanasios Gaitatzes, Georgios Papaioannou, Dimitr...
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
15 years 7 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
« Prev « First page 1886 / 2080 Last » Next »