Sciweavers

8087 search results - page 1503 / 1618
» Meta Data Management
Sort
View
CRYPTO
2005
Springer
97views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
Generic Transformation for Scalable Broadcast Encryption Schemes
Broadcast encryption schemes allow a message sender to broadcast an encrypted data so that only legitimate receivers decrypt it. Because of the intrinsic nature of one-to-many comm...
Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
GRID
2005
Springer
15 years 9 months ago
A credential renewal service for long-running jobs
— Jobs on the Grid require security credentials throughout their run for accessing secure Grid resources, such as GridFTP data repositories. However, delegating long-lived creden...
Daniel Kouril, Jim Basney
ICCS
2005
Springer
15 years 9 months ago
Java-Based Grid Service Spread and Implementation in Remote Sensing Applications
Remote sensing applications often concern very large volumes of spatio-temporal data, the emerging Grid computing technologies bring an effective solution to this problem. The Open...
Yanguang Wang, Yong Xue, Jianqin Wang, Chaolin Wu,...
ICS
2005
Tsinghua U.
15 years 9 months ago
High performance support of parallel virtual file system (PVFS2) over Quadrics
Parallel I/O needs to keep pace with the demand of high performance computing applications on systems with ever-increasing speed. Exploiting high-end interconnect technologies to ...
Weikuan Yu, Shuang Liang, Dhabaleswar K. Panda
HT
2004
ACM
15 years 9 months ago
Hypertext versioning for embedded link models
In this paper, we describe Chrysant, a hypertext version control system for embedded link models. Chrysant provides generalpurpose versioning capability to hypertext systems with ...
Kai Pan, E. James Whitehead Jr., Guozheng Ge
« Prev « First page 1503 / 1618 Last » Next »