Sciweavers

1363 search results - page 190 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
CN
2007
172views more  CN 2007»
14 years 11 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
CORR
2007
Springer
135views Education» more  CORR 2007»
14 years 11 months ago
The Unix KISS: A Case Study
In this paper we show that the initial philosophy used in designing and developing UNIX in early times has been forgotten due to “fast practices”. We question the leitmotif th...
Franco Milicchio
ENTCS
2007
100views more  ENTCS 2007»
14 years 11 months ago
JOLIE: a Java Orchestration Language Interpreter Engine
Service oriented computing is an emerging paradigm for programming distributed applications based on services. Services are simple software elements that supply their functionalit...
Fabrizio Montesi, Claudio Guidi, Roberto Lucchi, G...
PERVASIVE
2006
Springer
14 years 11 months ago
The Smart Tachograph - Individual Accounting of Traffic Costs and Its Implications
Today, several costs caused by road traffic may either be only roughly approximated, or cannot be clearly assigned to the drivers causing them, or both. They are typically distribu...
Vlad Coroama
QUESTA
2006
98views more  QUESTA 2006»
14 years 11 months ago
The discrete-time preemptive repeat identical priority queue
Priority queueing systems come natural when customers with diversified delay requirements have to wait to get service. The customers that cannot tolerate but small delays get serv...
Joris Walraevens, Dieter Fiems, Herwig Bruneel