Sciweavers

3844 search results - page 619 / 769
» Distributed Meeting Scheduling
Sort
View
130
Voted
ICSM
2002
IEEE
15 years 9 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
WETICE
2002
IEEE
15 years 9 months ago
Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments
Access control is one of the key requirements in enterprise security. A number of approaches in distributed systems have been designed that support various (new) paradigms such as...
Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gera...
KIVS
2001
Springer
15 years 8 months ago
Real-Time Support on Top of Ethernet
Ethernet is a widely used low-cost networking technology. It however lacks the determinism and resource management features needed to meet realtime requirements of multimedia appli...
Rainer Koster, Thorsten Kramp
124
Voted
REFLECTION
1999
Springer
15 years 8 months ago
The Design of a Resource-Aware Reflective Middleware Architecture
Middleware has emerged as an important architectural component in supporting distributed applications. With the expanding role of middleware, however, a number of problems are emer...
Gordon S. Blair, Fábio M. Costa, Geoff Coul...
INFOCOM
1997
IEEE
15 years 8 months ago
Design and Performance Analysis of a Growable Multicast ATM Switch
In ihis paper, we design and analyze a growable multicast ATM switch. It can grow to a large size since both cell routing and contention resolution are designed to distribute over...
Kuochen Wang, Ming-Howe Cheng