Sciweavers

14824 search results - page 2689 / 2965
» Security - Introduction
Sort
View
GCA
2008
15 years 4 months ago
A Grid Resource Broker with Dynamic Loading Prediction Scheduling Algorithm in Grid Computing Environment
In a Grid Computing environment, there are various important issues, including information security, resource management, routing, fault tolerance, and so on. Among these issues, ...
Yi-Lun Pan, Chang-Hsing Wu, Weicheng Huang
IADIS
2008
15 years 4 months ago
Autonomous Presentation Capture In Corporate And Educational Settings
While researchers have been exploring automatic presentation capture since the 1990's, real world adoption has been limited. Our research focuses on simplifying presentation ...
David M. Hilbert, Thea Turner, Laurent Denoue, Kan...
ICISC
2008
123views Cryptology» more  ICISC 2008»
15 years 4 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
HCI
2007
15 years 4 months ago
A Cross Culture Study on Phone Carrying and Physical Personalization
The mobile phone has become one of the essential objects that people carry when they leave home. By conducting a series of street interviews in 11 cities on 4 continents, we attemp...
Yanqing Cui, Jan Chipchase, Fumiko Ichikawa
ICWS
2008
IEEE
15 years 4 months ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar
« Prev « First page 2689 / 2965 Last » Next »