Sciweavers

1363 search results - page 97 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
ICDCSW
2003
IEEE
15 years 8 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
COLCOM
2009
IEEE
15 years 8 months ago
Information retrieval on mind maps - what could it be good for?
—Mind maps are used by millions of people. In this paper we present how information retrieval on mind maps could be used to enhance expert search, document summarization, keyword...
Jöran Beel, Bela Gipp, Jan-Olaf Stiller
123
Voted
FTDCS
1999
IEEE
15 years 7 months ago
Lessons Learned from Building a Web-Based Spatial Data Discovery Facility
This paper discusses the lessons learned and decisions made while designing and developing a web-based application for the National Spatial Information Framework (NSIF) of South A...
Ferdie Danzfuss, Judith Bishop
116
Voted
IWPC
1996
IEEE
15 years 7 months ago
Evaluating process clusters to support automatic program understanding
Evaluating the design of a distributed application is di cult but provides useful information for program development and maintenance. In distributed debugging, for example, proce...
Thomas Kunz
ICPADS
1994
IEEE
15 years 7 months ago
Delayed Precise Invalidation - A Software Cache Coherence Scheme
: Software cache coherence schemes are very desirable in the design of scalable multiprocessors and massively parallel processors. The authors propose a software cache coherence sc...
T.-S. Hwang, C.-P. Chung