Sciweavers

1402 search results - page 199 / 281
» Distributed Integrity Checking for Systems with Replicated D...
Sort
View
184
Voted
WOA
2010
15 years 1 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
JCM
2008
242views more  JCM 2008»
15 years 4 months ago
SimANet - A Large Scalable, Distributed Simulation Framework for Ambient Networks
In this paper, we present a new simulation platform for complex, radio standard spanning mobile Ad Hoc networks. SimANet - Simulation Platform for Ambient Networks - allows the coe...
Matthias Vodel, Matthias Sauppe, Mirko Caspar, Wol...
VLDB
2002
ACM
110views Database» more  VLDB 2002»
15 years 3 months ago
Extending an ORDBMS: The StateMachine Module
Extensibility is one of the mayor benefits of object-relational database management systems. We have used this system property to implement a StateMachine Module inside an object-...
Wolfgang Mahnke, Christian Mathis, Hans-Peter Stei...
MSS
1999
IEEE
111views Hardware» more  MSS 1999»
15 years 8 months ago
Massive-Scale Data Management using Standards-Based Solutions
In common with many large institutes, CERN has traditionally developed and maintained its own data management solutions. Recently, a significant change of direction has taken plac...
Jamie Shiers
SACMAT
2009
ACM
15 years 10 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...