Sciweavers

8493 search results - page 1505 / 1699
» Implementing a distributed firewall
Sort
View
ISORC
2002
IEEE
15 years 9 months ago
End-to-End Latency of a Fault-Tolerant CORBA Infrastructure
This paper presents measured probability density functions (pdfs) for the end-to-end latency of two-way remote method invocations from a CORBA client to a replicated CORBA server ...
Wenbing Zhao, Louise E. Moser, P. M. Melliar-Smith
SACMAT
2010
ACM
15 years 8 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
SIGMOD
2010
ACM
249views Database» more  SIGMOD 2010»
15 years 8 months ago
Active knowledge: dynamically enriching RDF knowledge bases by web services
The proliferation of knowledge-sharing communities and the advances in information extraction have enabled the construction of large knowledge bases using the RDF data model to re...
Nicoleta Preda, Gjergji Kasneci, Fabian M. Suchane...
GPCE
2009
Springer
15 years 8 months ago
A generative programming approach to developing pervasive computing systems
Developing pervasive computing applications is a difficult task because it requires to deal with a wide range of issues: heterogeneous devices, entity distribution, entity coordi...
Damien Cassou, Benjamin Bertran, Nicolas Loriant, ...
EUROPAR
2001
Springer
15 years 8 months ago
Building TMR-Based Reliable Servers Despite Bounded Input Lifetimes
This paper is on the construction of a server subsystem in a client/server system in an application context where the number of potential clients can be arbitrarily large. The imp...
Paul D. Ezhilchelvan, Jean-Michel Hélary, M...
« Prev « First page 1505 / 1699 Last » Next »