Sciweavers

5790 search results - page 860 / 1158
» Distributed programming with distributed authorization
Sort
View
88
Voted
JUCS
2007
104views more  JUCS 2007»
15 years 2 months ago
Achieving Atomicity for Web Services Using Commutativity of Actions
: Web Services enable the creation of complex business activities through the cooperation of independently developed software programs. However, Web Services incur the risk of long...
P. Michael Melliar-Smith, Louise E. Moser
122
Voted
PC
2002
82views Management» more  PC 2002»
15 years 2 months ago
Time-minimal tiling when rise is larger than zero
This paper presents a solution to the open problem of finding the optimal tile size to minimise the execution time of a parallelogram-shaped iteration space on a distributed memory...
Jingling Xue, Wentong Cai
137
Voted
JSS
2010
111views more  JSS 2010»
15 years 1 months ago
Promoting the development of secure mobile agent applications
In this paper we present a software architecture and a development environment for the implementation of applications based on secure mobile agents. Recent breakthroughs in mobile...
Carles Garrigues, Sergi Robles, Joan Borrell, Guil...
124
Voted
RAID
2010
Springer
15 years 1 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
158
Voted
WCNC
2010
IEEE
15 years 1 months ago
Sensing and Communication Tradeoff for Cognitive Access of Continues-Time Markov Channels
—Dynamic spectrum access (DSA) aims to improve spectrum efficiency via spectrum sensing and optimal spectrum access. An essential component in DSA is the joint design of sensing...
Xin Li, Qianchuan Zhao, Xiaohong Guan, Lang Tong