Sciweavers

5723 search results - page 992 / 1145
» Network Management
Sort
View
SACMAT
2010
ACM
15 years 9 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
INFOCOM
2008
IEEE
15 years 10 months ago
Multicast Tree Diameter for Dynamic Distributed Interactive Applications
Abstract—Latency reduction in distributed interactive applications has been studied intensively. Such applications may have stringent latency requirements and dynamic user groups...
Knut-Helge Vik, Pål Halvorsen, Carsten Griwo...
WIKIS
2006
ACM
15 years 10 months ago
OntoWiki: community-driven ontology engineering and ontology usage based on Wikis
Ontologies are consensual representations of a domain of discourse and the backbone of the future Semantic Web. Currently, however, only a fraction of Web users can take part in t...
Martin Hepp, Daniel Bachlechner, Katharina Siorpae...
TON
2010
188views more  TON 2010»
14 years 10 months ago
Self-Chord: A Bio-Inspired P2P Framework for Self-Organizing Distributed Systems
This paper presents "Self-Chord," a peer-to-peer (P2P) system that inherits the ability of Chord-like structured systems for the construction and maintenance of an overla...
Agostino Forestiero, Emilio Leonardi, Carlo Mastro...
HPDC
2008
IEEE
15 years 10 months ago
Combining batch execution and leasing using virtual machines
As cluster computers are used for a wider range of applications, we encounter the need to deliver resources at particular times, to meet particular deadlines, and/or at the same t...
Borja Sotomayor, Kate Keahey, Ian T. Foster