Sciweavers

2163 search results - page 350 / 433
» Middleware
Sort
View
61
Voted
OTM
2005
Springer
15 years 3 months ago
Distributed Authentication in GRID5000
Abstract. Between high-performance clusters and grids appears an intermediate infrastructure called cluster grid that corresponds to the interconnection of clusters through the Int...
Sébastien Varrette, Sebastien Georget, Joha...
SPC
2005
Springer
15 years 3 months ago
Supporting Dynamically Changing Authorizations in Pervasive Communication Systems
In pervasive computing environments, changes in context may trigger changes in an individual’s access permissions. We contend that existing access control frameworks do not provi...
Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Pras...
VLDB
2005
ACM
159views Database» more  VLDB 2005»
15 years 3 months ago
Temporal Management of RFID Data
RFID technology can be used to significantly improve the efficiency of business processes by providing the capability of automatic identification and data capture. This technol...
Fusheng Wang, Peiya Liu
HT
2004
ACM
15 years 3 months ago
How much is too much in a hypertext link?: investigating context and preview - a formative evaluation
A high quality of free movement, or mobility, is key to the accessibility, design, and usability of many ‘common-use’ hypermedia resources (Web sites) and key to good mobility...
Simon Harper, Yeliz Yesilada, Carole A. Goble, Rob...
MM
2004
ACM
124views Multimedia» more  MM 2004»
15 years 3 months ago
Towards an integrated multimedia service hosting overlay
With the proliferation of multimedia data sources on the Internet, we envision an increasing demand for value-added and functionrich multimedia services that transport, process, a...
Dongyan Xu, Xuxian Jiang