Sciweavers

2375 search results - page 325 / 475
» From Remote Objects to Physically Distributed Objects
Sort
View
126
Voted
ASWEC
2006
IEEE
15 years 9 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
124
Voted
HICSS
2005
IEEE
132views Biometrics» more  HICSS 2005»
15 years 9 months ago
A Soft Systems Analysis of Social Cognition In Boundary-Spanning Innovation
The term social cognition is used in the psychology and organizational literatures to denote many different manifestations of the mental representations and processes that underli...
Susan Gasson
127
Voted
ICDCS
2005
IEEE
15 years 9 months ago
Keyword Search in DHT-Based Peer-to-Peer Networks
Existing techniques for keyword/attribute search in structured P2P overlays suffer from several problems: unbalanced load, hot spots, fault tolerance, storage redundancy, and unab...
Yuh-Jzer Joung, Chien-Tse Fang, Li-Wei Yang
128
Voted
IPPS
2005
IEEE
15 years 9 months ago
Securely Replicated Web Documents
In order to achieve better scalability and reduce latency in handling user requests, many Web applications make extensive use of data replication through caches and Content Delive...
Bogdan C. Popescu, Maarten van Steen, Bruno Crispo...
146
Voted
GCC
2005
Springer
15 years 9 months ago
Research on Semantic-Based Web Services Registry Federation
Meta modeling is an effective approach to implement interoperability among distributed and heterogeneous information sources on Web. MMFI (Framework for Metamodel Interoperability)...
Bing Li, Fei He, Wudong Liu, Keqing He, Jin Liu