Sciweavers

5790 search results - page 18 / 1158
» Distributed programming with distributed authorization
Sort
View
77
Voted
LLC
2010
14 years 8 months ago
Distributed Morphology
Daniel Siddiqi
187
Voted
IFIP
2011
Springer
14 years 5 months ago
Autonomous Planning Framework for Distributed Multiagent Robotic Systems
Marko Svaco, Bojan Sekoranja, Bojan Jerbic
PCM
2009
Springer
98views Multimedia» more  PCM 2009»
15 years 6 months ago
Secure Domain Architecture for Interoperable Content Distribution
Authorized domains are used to share digital content among multiple devices without violating the copyright issues. However, if a domain is composed of multiple devices supporting ...
Lei Lei Win, Tony Thomas, Sabu Emmanuel, Mohan S. ...
JASIS
2002
76views more  JASIS 2002»
15 years 1 months ago
Duality revisited: Construction of fractional frequency distributions based on two dual Lotka laws
Fractional frequency distributions of e.g. authors with a certain (fractional) number of papers are very irregular and, therefore, not easy to model or to explain. This paper give...
Leo Egghe, I. K. Ravichandra Rao
HPDC
1998
IEEE
15 years 6 months ago
Authorization for Metacomputing Applications
One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved ...
G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman