Sciweavers

1379 search results - page 258 / 276
» Software Agents in Network Management
Sort
View
CSCW
2006
ACM
15 years 5 months ago
Identification of coordination requirements: implications for the Design of collaboration and awareness tools
Task dependencies drive the need to coordinate work activities. We describe a technique for using automatically generated archival data to compute coordination requirements, i.e.,...
Marcelo Cataldo, Patrick Wagstrom, James D. Herbsl...
ELPUB
2006
ACM
15 years 5 months ago
Weaving the Web of Science. HyperJournal and the Impact of the Semantic Web on Scientific Publishing
In this paper we present HyperJournal, an Open Source web application for publishing on-line Open Access scholarly journals. In the first part (sections 1-3) we briefly describe t...
Michele Barbera, Francesca Di Donato
SWS
2006
ACM
15 years 5 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch
HOTI
2005
IEEE
15 years 5 months ago
Hybrid Cache Architecture for High Speed Packet Processing
: The exposed memory hierarchies employed in many network processors (NPs) are expensive in terms of meeting the worst-case processing requirement. Moreover, it is difficult to ef...
Zhen Liu, Kai Zheng, Bin Liu
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
15 years 5 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...