Sciweavers

517 search results - page 49 / 104
» Distributed Authentication in GRID5000
Sort
View
JMM2
2006
103views more  JMM2 2006»
14 years 9 months ago
Content Distribution for Telecom Carriers
-- Distribution of digital content is a key revenue opportunity for telecommunications carriers. As media content moves from analog and physical media-based distribution to digital...
Benjamin Falchuk, David Gorton, Dave Marples
NETGAMES
2006
ACM
15 years 3 months ago
Peer clustering: a hybrid approach to distributed virtual environments
This paper proposes a hybrid architecture for distributed virtual environments, utilizing servers alongside peer-to-peer components. Current research into peer-based systems seeks...
Alvin Chen, Richard R. Muntz
DBSEC
2010
162views Database» more  DBSEC 2010»
14 years 11 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
CVPR
2008
IEEE
15 years 4 months ago
The statistical modelling of fingerprint minutiae distribution with implications for fingerprint individuality studies
The spatial distribution of fingerprint minutiae is a core problem in the fingerprint individuality study, the cornerstone of the fingerprint authentication technology. Previously...
Jiansheng Chen, Yiu Sang Moon
AINA
2005
IEEE
15 years 3 months ago
A Practical Modelling Notation for Secure Distributed Computation
Mobile code computation has lead to a new paradigm of distributed computation. A mobile process can move from site to site and interact with the resources as a local process. To p...
Yih-Jiun Lee, Peter Henderson