Sciweavers

490 search results - page 42 / 98
» Enabling User Control with Personal Identity Management
Sort
View
95
Voted
SISW
2003
IEEE
15 years 5 months ago
Decentralized Authentication Mechanisms for Object-based Storage Devices
Network-attached object-based storage separates data-path from control-path and enables direct interaction between clients and the storage devices. Clients interact with the file...
Vishal Kher, Yongdae Kim
97
Voted
ATAL
2004
Springer
15 years 5 months ago
The SPARK Agent Framework
There is a need for agent systems that can scale to realworld applications, yet retain the clean semantic underpinning of more formal agent frameworks. We describe the SRI Procedu...
David N. Morley, Karen L. Myers
99
Voted
DSOM
2007
Springer
15 years 6 months ago
Customer Service Management for Grid Monitoring and Accounting Data
Abstract. Experiences with the management of Grid specific monitoring and accounting data have shown that current approaches do not sufficiently support a distinction between prov...
Timo Baur, Samah Bel Haj Saad
ERCIMDL
2004
Springer
112views Education» more  ERCIMDL 2004»
15 years 5 months ago
System Support for Name Authority Control Problem in Digital Libraries: OpenDBLP Approach
In maintaining Digital Libraries, having bibliographic data up-to-date is critical, yet often minor irregularities may cause information isolation. Unlike documents for which vario...
Yoojin Hong, Byung-Won On, Dongwon Lee
104
Voted
VLDB
1993
ACM
113views Database» more  VLDB 1993»
15 years 4 months ago
An Active Object-Oriented Database: A Multi-Paradigm Approach to Constraint Management
Mb describe the design and implementation of a constraint management facility for our active object-oriented database system called Jasmine/A. The facility includes integrity cons...
Hiroshi Ishikawa, Kazumi Kubota