Sciweavers

1135 search results - page 60 / 227
» On Performance of Delegation in Java
Sort
View
134
Voted
WETICE
1998
IEEE
15 years 8 months ago
Using SESAME's GSS-API to add Security to Unix Applications
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...
108
Voted
ATAL
2006
Springer
15 years 7 months ago
A comparison between mechanisms for sequential compute resource auctions
This paper describes simulations designed to test the relative efficiency of two different sequential auction mechanisms for allocating compute resources between users in a shared...
Andrew Byde
ICIA
2007
15 years 6 months ago
Towel: Towards an Intelligent To-Do List
In this paper we describe Towel, a task management application that couples a user’s to-do list with a software personal assistant. This to-do list provides a unified environmen...
Kenneth Conley, James Carpenter
122
Voted
WOA
2004
15 years 5 months ago
A Personal Agent Supporting Ubiquitous Interaction
This paper is concerned with the development of a MultiAgent System (MAS) supporting ubiquitous and personalized interaction with Active Environments. In particular, we propose a ...
Giovanni Cozzolongo, Berardina De Carolis, Sebasti...
142
Voted
TPDS
2008
262views more  TPDS 2008»
15 years 3 months ago
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
Content services such as content filtering and transcoding adapt contents to meet system requirements, display capacities, or user preferences. Data security in such a framework is...
Yunhua Koglin, Danfeng Yao, Elisa Bertino