Sciweavers

2904 search results - page 444 / 581
» Internet Infrastructure Security
Sort
View
137
Voted
ICDCS
2000
IEEE
15 years 8 months ago
Active Files: A Mechanism for Integrating Legacy Applications into Distributed Systems
Despite increasingly distributed internet information sources with diverse storage formats and access-control constraints, most of the end applications (e.g., filters and media p...
Partha Dasgupta, Ayal Itzkovitz, Vijay Karamcheti
118
Voted
MOBICOM
1999
ACM
15 years 8 months ago
Next Century Challenges: Data-Centric Networking for Invisible Computing
Computing and telecommunications are maturing, and the next century promises a shift away from technology-driven general-purpose devices. Instead, we will focus on the needs of co...
Mike Esler, Jeffrey Hightower, Thomas E. Anderson,...
115
Voted
HOTOS
1999
IEEE
15 years 8 months ago
Xenoservers: Accountable Execution of Untrusted Programs
Many networked applications could benefit from executing closer to the data or services with which they interact. By doing this they may be able to circumvent long communication l...
Dickon Reed, Ian Pratt, Paul Menage, Stephen Early...
122
Voted
WETICE
1999
IEEE
15 years 8 months ago
Replacing Copies with Connections: Managing Software across the Virtual Organization
The Internet, the World Wide Web, JavaTM technology, and software components are changing the software business. Activities traditionally constrained by the need for intense infor...
Tobias Murer, Michael L. Van de Vanter
129
Voted
ICSE
1999
IEEE-ACM
15 years 8 months ago
A Cooperative Approach to Support Software Deployment Using the Software Dock
Software deployment is an evolving collection of interrelated processes such as release, install, adapt, reconfigure, update, activate, deactivate, remove, and retire. The connect...
Richard S. Hall, Dennis Heimbigner, Alexander L. W...