Sciweavers

3999 search results - page 154 / 800
» Design of Optical Access Systems using Computer Modeling
Sort
View
134
Voted
DAIS
2006
15 years 6 months ago
Using Speculative Push for Unnecessary Checkpoint Creation Avoidance
Abstract. This paper discusses a way of incorporating speculation techniques into Distributed Shared Memory (DSM) systems with checkpointing mechanism without creating unnecessary ...
Arkadiusz Danilecki, Michal Szychowiak
PODS
2005
ACM
119views Database» more  PODS 2005»
16 years 5 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
HCI
2009
15 years 2 months ago
A New Approach to Design an Interactive System for Molecular Analysis
The rapid evolution of molecule's imaging and observation's techniques has caused a growing interest in studying molecular structures. Naturally, scientists have turned t...
Mouna Essabbah, Samir Otmane, Joan Hérisson...
CONCURRENCY
1998
83views more  CONCURRENCY 1998»
15 years 4 months ago
Supporting universal personal computing on the Internet with Java and CORBA
Universal Personal Computing (UPC) supports nomadic computing on the Internet by allowing mobile users to access their personalized computing resources anywhere on the Internet us...
Jinsong Zhu, Maria Törö, Victor C. M. Le...
151
Voted
ICCS
2001
Springer
15 years 9 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...