Sciweavers

354 search results - page 61 / 71
» Key management for content access control in a hierarchy
Sort
View
SIGMOD
1994
ACM
175views Database» more  SIGMOD 1994»
15 years 1 months ago
Sleepers and Workaholics: Caching Strategies in Mobile Environments
In the mobile wireless computing environment of the future, a large number of users, equipped with low-powered palmtop machines, will query databases over wireless communication ch...
Daniel Barbará, Tomasz Imielinski
ICC
2009
IEEE
130views Communications» more  ICC 2009»
15 years 4 months ago
Flexible Single Sign-On for SIP: Bridging the Identity Chasm
—Identity federation is a key requirement for today’s distributed services. This technology allows managed sharing of users’ identity information between identity providers (...
Pin Nie, Juha-Matti Tapio, Sasu Tarkoma, Jani Heik...
80
Voted
SC
1993
ACM
15 years 1 months ago
The high performance storage system
The High Performance Storage System (HPSS) is a mature Hierarchical Storage Management (HSM) system that was developed around a network-centered architecture, with client access t...
Robert A. Coyne, Harry Hulen, Richard Watson
ADHOC
2007
118views more  ADHOC 2007»
14 years 9 months ago
Sticky CSMA/CA: Implicit synchronization and real-time QoS in mesh networks
We propose a novel approach to QoS for real-time traffic over wireless mesh networks, in which application layer characteristics are exploited or shaped in the design of medium ac...
Sumit Singh, Prashanth Aravinda Kumar Acharya, Upa...
VLDB
2007
ACM
187views Database» more  VLDB 2007»
15 years 9 months ago
Secure Data Outsourcing
The networked and increasingly ubiquitous nature of today's data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly...
Radu Sion