Sciweavers

6555 search results - page 1078 / 1311
» Secure attribute-based systems
Sort
View
120
Voted
JCM
2007
114views more  JCM 2007»
15 years 3 months ago
Tunable Pulse Amplitude and Position Modulation Technique for Reliable Optical Wireless Communication Channels
—Modulation techniques have attracted increasing attention in optical wireless communications. Basic schemes such as on off keying (OOK), pulse amplitude modulation (PAM) and pul...
Yu Zeng, Roger J. Green, Shaobo Sun, Mark S. Leeso...
118
Voted
JOT
2007
106views more  JOT 2007»
15 years 3 months ago
Extending eclipse RCP with dynamic update of active plug-ins
While the dynamic linking mechanism of modern programming languages, such as Java, allows loading of classes dynamically, it does not allow class reloading. Hence, dynamic linking...
Allan Raundahl Gregersen, Bo Nørregaard J&o...
139
Voted
AIL
2004
111views more  AIL 2004»
15 years 3 months ago
Anonymity and software agents: An interdisciplinary challenge
Software agents that play a role in E-commerce and E-government applications involving the Internet often contain information about the identity of their human user such as credit ...
Frances M. T. Brazier, Anja Oskamp, Corien Prins, ...
112
Voted
JSW
2007
90views more  JSW 2007»
15 years 3 months ago
Fine-Grained and Scalable Message Protection in Sensitive Organizations
Abstract— Today electronic messaging services are indispensable to individuals and organizations. If a message contains sensitive information, the integrity and confidentiality ...
Joon S. Park, Ganesh Devarajan
125
Voted
CLUSTER
2002
IEEE
15 years 3 months ago
Condor-G: A Computation Management Agent for Multi-Institutional Grids
In recent years, there has been a dramatic increase in the amount of available computing and storage resources. Yet few have been able to exploit these resources in an aggregated ...
James Frey, Todd Tannenbaum, Miron Livny, Ian T. F...
« Prev « First page 1078 / 1311 Last » Next »