Sciweavers

241 search results - page 34 / 49
» Secure Remote Control of Field-programmable Network Devices
Sort
View
IM
2007
15 years 1 months ago
Autonomic Management of Component-Based Embedded Software
Abstract— Software components embedded in ubiquitous systems, especially those using wireless networking, are subject to unpredictable behaviors inherent to using these systems i...
Fabien Romeo, Franck Barbier, Jean-Michel Bruel
COMPUTER
1999
108views more  COMPUTER 1999»
14 years 11 months ago
Distance Visualization: Data Exploration on the Grid
Scientific visualization has emerged as an important tool for extracting meaning from the large volumes of data produced by scientific instruments and simulations. Increasingly, t...
Ian T. Foster, Joseph A. Insley, Gregor von Laszew...
VLDB
2007
ACM
187views Database» more  VLDB 2007»
15 years 12 months ago
Secure Data Outsourcing
The networked and increasingly ubiquitous nature of today's data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly...
Radu Sion
COMPSAC
2006
IEEE
15 years 5 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
VLDB
1994
ACM
84views Database» more  VLDB 1994»
15 years 3 months ago
A Transaction Replication Scheme for a Replicated Database with Node Autonomy
Many proposed protocols for replicated databases consider centralized control of each transaction so that given a transaction, some site will monitor the remote data access and tr...
Ada Wai-Chee Fu, David Wai-Lok Cheung