Sciweavers

5790 search results - page 355 / 1158
» Distributed programming with distributed authorization
Sort
View
COLCOM
2007
IEEE
15 years 10 months ago
SemCW: Semantic collaborative writing using RST
—During collaborative writing each author works on a copy of the shared document. These copies are then merged to produce the final document. This asynchronous work is supported...
Charbel Rahhal, Hala Skaf-Molli, Pascal Molli, Nis...
DIGRA
2005
Springer
15 years 9 months ago
Architecting Scalability for Massively Multiplayer Online Gaming Experiences
In this study, the authors propose to discuss scalability challenges posed by Massively Multiplayer Online Game (MMOG) scenarios, while outlining issues specific to the context of...
Rui Gil, José Tavares, Licinio Roque
PPPJ
2004
ACM
15 years 9 months ago
Embedding JAAS in agent roles to apply local security policies
Agents are an emerging technology that grants programmers a new way to exploit distributed resources. Roles are a powerful concept that can be used to model agent interactions, all...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi
ESORICS
2004
Springer
15 years 9 months ago
Hindering Eavesdropping via IPv6 Opportunistic Encryption
This paper presents an opportunistic encryption scheme strictly layered on top of IPv6. Assuming that a node needs to send data toward another node, our proposal enables the dynami...
Claude Castelluccia, Gabriel Montenegro, Julien La...
EUSFLAT
2001
116views Fuzzy Logic» more  EUSFLAT 2001»
15 years 5 months ago
Risk assessment in natural disasters with fuzzy probabilities
Risk assessment in regions with low earthquake activity is important for reinsurance companies and governmental building authorities. They need a complete picture of the possible ...
Uwe Wagner