Sciweavers

2504 search results - page 485 / 501
» Enterprise Security Architecture
Sort
View
ESAS
2004
Springer
15 years 5 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
ICWE
2004
Springer
15 years 5 months ago
WebRatio, an Innovative Technology for Web Application Development
A data–intensive Web application is a Web-enabled software system for the publication and management of large data collections, typically stored in one or more database manageme...
Roberto Acerbis, Aldo Bongio, Stefano Butti, Stefa...
HCW
2000
IEEE
15 years 4 months ago
Evaluation of PAMS' Adaptive Management Services
Management of large-scale parallel and distributed applications is an extremely complex task due to factors such as centralized management architectures, lack of coordination and ...
Yoonhee Kim, Salim Hariri, Muhamad Djunaedi
DRM
2006
Springer
15 years 3 months ago
The problem with rights expression languages
In this paper we consider the functionality that a rights expression language (REL) should provide within a digital rights management (DRM) environment. We begin by noting the dea...
Pramod A. Jamkhedkar, Gregory L. Heileman, Iv&aacu...
ARITH
2001
IEEE
15 years 3 months ago
Computer Arithmetic-A Processor Architect's Perspective
The Instruction Set Architecture (ISA) of a programmable processor is the native languageof the machine. It defines the set of operations and resourcesthat are optimized for that ...
Ruby B. Lee