Sciweavers

259 search results - page 37 / 52
» Designing Information Appliances Using a Resource Replicatio...
Sort
View
HIPEAC
2005
Springer
15 years 8 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
COOPIS
1998
IEEE
15 years 7 months ago
Context Mediation on Wall Street
This paper reports on a practical implementation of a context mediator for the fixed income securities industry. We describe industry circumstances and the data and calculation se...
Allen Moulton, Stuart E. Madnick, Michael Siegel
HPDC
2002
IEEE
15 years 8 months ago
A Scalable QoS-Aware Service Aggregation Model for Peer-to-Peer Computing Grids
Peer-to-peer (P2P) computing grids consist of peer nodes that communicate directly among themselves through wide-area networks and can act as both clients and servers. These syste...
Xiaohui Gu, Klara Nahrstedt
SACMAT
2003
ACM
15 years 8 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
IPM
2007
156views more  IPM 2007»
15 years 3 months ago
Integration of an XML electronic dictionary with linguistic tools for natural language processing
This study proposes the codification of lexical information in electronic dictionaries, in accordance with a generic and extendable XML scheme model, and its conjunction with lin...
Octavio Santana Suárez, Francisco J. Carrer...