Sciweavers

819 search results - page 127 / 164
» Security Controls Applied to Web Service Architectures
Sort
View
SOCA
2007
IEEE
15 years 4 months ago
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or grou...
Venkatraman Ramakrishna, Kevin Eustice, Peter L. R...
CORR
2010
Springer
164views Education» more  CORR 2010»
14 years 8 months ago
Securing AODV for MANETs using Message Digest with Secret Key
Due to lack of the infrastructure, open peer-to-peer architecture, shared wireless medium, limited resource constraints and highly dynamic topology, MANETs (Mobile Adhoc Networks) ...
Kamaljit I. Lakhtaria, Bhaskar N. Patel, Satish G....
APWEB
2006
Springer
15 years 1 months ago
HVEM Grid: Experiences in Constructing an Electron Microscopy Grid
This paper proposes HVEM-Grid, which is the cornerstone for tele-instrumentation infrastructure. The proposed architecture is mainly oriented for people whose primary work is to ge...
Hyuck Han, Hyungsoo Jung, Heon Young Yeom, Hee S. ...
74
Voted
LREC
2010
154views Education» more  LREC 2010»
14 years 11 months ago
CCASH: A Web Application Framework for Efficient, Distributed Language Resource Development
We introduce CCASH (Cost-Conscious Annotation Supervised by Humans), an extensible web application framework for cost-efficient annotation. CCASH provides a framework in which cos...
Paul Felt, Owen Merkling, Marc Carmen, Eric K. Rin...
ICAC
2006
IEEE
15 years 3 months ago
Towards Autonomic Grid Data Management with Virtualized Distributed File Systems
Grid data management is a challenging task because of the heterogeneous, dynamic and largescale nature of Grid environments. This paper proposes an autonomic Grid data management ...
Ming Zhao 0002, Jing Xu, Renato J. O. Figueiredo