Sciweavers

1363 search results - page 193 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
134
Voted
JGAA
2000
179views more  JGAA 2000»
15 years 3 months ago
Approximation Algorithms for Some Graph Partitioning Problems
This paper considers problems of the following type: given an edgeweighted k-colored input graph with maximum color class size c, find a minimum or maximum c-way cut such that eac...
George He, Jiping Liu, Cheng Zhao
JACM
2002
87views more  JACM 2002»
15 years 3 months ago
Bounded concurrent timestamp systems using vector clocks
Abstract. Shared registers are basic objects used as communication mediums in asynchronous concurrent computation. A concurrent timestamp system is a higher typed communication obj...
Sibsankar Haldar, Paul M. B. Vitányi
JNSM
1998
94views more  JNSM 1998»
15 years 3 months ago
Design and Implementation of TMN SMK System Using CORBA ORB
In Telecommunication Management Network (TMN), the interworking of manager and agent requires the sharing of management information defined as Shared Management Knowledge (SMK) in...
Jong-Tae Park, Su-Ho Ha, James Won-Ki Hong
SAC
2002
ACM
15 years 3 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
IAJIT
2010
133views more  IAJIT 2010»
15 years 1 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa