Sciweavers

817 search results - page 151 / 164
» Remote Reality Demonstration
Sort
View
136
Voted
SACMAT
2010
ACM
15 years 6 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
PVM
2001
Springer
15 years 6 months ago
Parallel IO Support for Meta-computing Applications: MPI_Connect IO Applied to PACX-MPI
Parallel IO (PIO) support for larger scale computing is becoming more important as application developers better understand its importance in reducing overall execution time by avo...
Graham E. Fagg, Edgar Gabriel, Michael M. Resch, J...
147
Voted
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
15 years 6 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
HPCA
1998
IEEE
15 years 6 months ago
PRISM: An Integrated Architecture for Scalable Shared Memory
This paper describes PRISM, a distributed sharedmemory architecture that relies on a tightly integrated hardware and operating system design for scalable and reliable performance....
Kattamuri Ekanadham, Beng-Hong Lim, Pratap Pattnai...
CSFW
2004
IEEE
15 years 5 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell