Sciweavers

5790 search results - page 718 / 1158
» Distributed programming with distributed authorization
Sort
View
JNSM
1998
94views more  JNSM 1998»
15 years 3 months ago
Design and Implementation of TMN SMK System Using CORBA ORB
In Telecommunication Management Network (TMN), the interworking of manager and agent requires the sharing of management information defined as Shared Management Knowledge (SMK) in...
Jong-Tae Park, Su-Ho Ha, James Won-Ki Hong
SAC
2002
ACM
15 years 3 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
IAJIT
2010
133views more  IAJIT 2010»
15 years 2 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa
PKDD
2010
Springer
169views Data Mining» more  PKDD 2010»
15 years 1 months ago
Efficient and Numerically Stable Sparse Learning
We consider the problem of numerical stability and model density growth when training a sparse linear model from massive data. We focus on scalable algorithms that optimize certain...
Sihong Xie, Wei Fan, Olivier Verscheure, Jiangtao ...
ACMIDC
2009
15 years 1 months ago
Developing a media space for remote synchronous parent-child interaction
While supporting family communication has traditionally been a domain of interest for interaction designers, few research initiatives have explicitly investigated remote synchrono...
Svetlana Yarosh, Stephen Cuzzort, Hendrik Mül...