Sciweavers

683 search results - page 55 / 137
» Infrastructure for Pervasive Computing: Challenges
Sort
View
120
Voted
CONTEXT
2003
Springer
15 years 5 months ago
A Generic Framework for Context-Based Distributed Authorizations
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Ghita Kouadri Mostéfaoui, Patrick Bré...
98
Voted
SAC
2002
ACM
15 years 6 days ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
167
Voted
CCGRID
2008
IEEE
15 years 7 months ago
GridBatch: Cloud Computing for Large-Scale Data-Intensive Batch Applications
To be competitive, Enterprises are collecting and analyzing increasingly large amount of data in order to derive business insights. However, there are at least two challenges to m...
Huan Liu, Dan Orban
109
Voted
SC
2005
ACM
15 years 6 months ago
SPICE: Simulated Pore Interactive Computing Environment
— SPICE aims to understand the vital process of translocation of biomolecules across protein pores by computing the free energy profile of the translocating biomolecule along th...
Shantenu Jha, Peter V. Coveney, Matt J. Harvey
AINA
2004
IEEE
15 years 4 months ago
Wide-Area Real-Time Distributed Computing in a Tightly Managed Optical Grid - An Optiputer Vision
: Wide area network (WAN) -based distributed computing (DC) has become an active field of research, especially under the label of grid computing. On the other hand, research on WAN...
K. H. (Kane) Kim