Sciweavers

3516 search results - page 524 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
HICSS
2009
IEEE
96views Biometrics» more  HICSS 2009»
15 years 11 months ago
Interconnection in the GCC Grid: The Economics of Change
The Gulf Cooperation Council (GCC) is nearing the completion of a high voltage transmission system designed to integrate the power systems of Saudi Arabia, Kuwait, Bahrain, Qatar,...
Richard D. Tabors
ADBIS
2006
Springer
160views Database» more  ADBIS 2006»
15 years 6 months ago
Data Ring: Let Us Turn the Net into a Database!
Because of information ubiquity, one observes an important trend towards transferring information management tasks from database systems to networks. We introduce the notion of Da...
Serge Abiteboul, Neoklis Polyzotis
SIGOPSE
1998
ACM
15 years 8 months ago
Distributed virtual machines: a system architecture for network computing
Modern virtual machines, such as Java and Inferno, are emerging as network computing s. While these virtual machines provide higher-level abstractions and more sophisticated servi...
Emin Gün Sirer, Robert Grimm, Brian N. Bersha...
INFOCOM
1999
IEEE
15 years 8 months ago
User-Friendly Access Control for Public Network Ports
We are facing a growing user demand for ubiquitous Internet access. As a result, network ports and wireless LANs are becoming common in public spaces inside buildings such as loung...
Guido Appenzeller, Mema Roussopoulos, Mary Baker
IAJIT
2010
87views more  IAJIT 2010»
15 years 2 months ago
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
: Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermed...
Khalid Abu Al-Saud, Hatim Mohd Tahir, Moutaz Saleh...