Sciweavers

201 search results - page 14 / 41
» Design and implementation of a secure wide-area object middl...
Sort
View
CORR
2010
Springer
108views Education» more  CORR 2010»
14 years 9 months ago
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characteriz
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these proto...
Danilo Valeros Bernardo, Doan B. Hoang
COOPIS
2003
IEEE
15 years 2 months ago
Re-factoring Middleware Systems: A Case Study
Abstract. Aspect oriented programming brings us new design perspectives since it permits the superimpositions of multiple abstraction models on top of one another. It is a very pow...
Charles Zhang, Hans-Arno Jacobsen
MA
2001
Springer
175views Communications» more  MA 2001»
15 years 2 months ago
Evaluating the Security of Three Java-Based Mobile Agent Systems
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution enviro...
Sebastian Fischmeister, Giovanni Vigna, Richard A....
COMPSAC
2009
IEEE
15 years 4 months ago
The Design and Implementation of a Bare PC Email Server
— This paper presents the architecture, design and implementation of an email server that runs on a bare PC without an operating system or hard-disk. In addition to providing sta...
George H. Ford Jr., Ramesh K. Karne, Alexander L. ...
RTCSA
2005
IEEE
15 years 3 months ago
On Building a Reflective Middleware Service for Location-Awareness
Location based services are becoming essential feature of context-awareness in ubiquitous computing. Reflective distribute component programming model is proposed to systematicall...
Uzair Ahmad, Uzma Nasir, Mahrin Iqbal, Young-Koo L...