Sciweavers

1134 search results - page 92 / 227
» Distributed Proving in Access-Control Systems
Sort
View
JIIS
2002
100views more  JIIS 2002»
15 years 3 months ago
Editorial - A Survey of Research Questions for Intelligent Information Systems in Education
Education is an application domain in which many research questions from Intelligent Information Systems may prove their worth. We discuss three themes in this editorial: distribut...
John C. Cherniavsky, Elliot Soloway
138
Voted
INFOCOM
2003
IEEE
15 years 8 months ago
A Bandwidth Guaranteed Polling MAC Protocol for Ethernet Passive Optical Networks
While the backbone networks have experienced substantial changes in the last decade; the access networks have not changed much. Recently, passive optical networks (PONs) seem to be...
Maode Ma
CCS
2008
ACM
15 years 5 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
115
Voted
COMPOS
1997
Springer
15 years 7 months ago
Compositional Refinement of Interactive Systems Modelled by Relations
We introduce a mathematical model of components that can be used for the description of both hardware and software units forming distributed interactive systems. As part of a distr...
Manfred Broy
SOSP
1993
ACM
15 years 4 months ago
Handling Audio and Video Streams in a Distributed Environment
Handling audio and video in a digital environment requires timely delivery of data. This paper describes the principles adopted in the design of the Pandora networked multi-media ...
Alan Jones, Andrew Hopper