Sciweavers

4455 search results - page 613 / 891
» The family and communication technologies
Sort
View
ISADS
1999
IEEE
15 years 5 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
ISADS
1999
IEEE
15 years 5 months ago
CORBA based Architecture for Large Scale Workflow
Standard client-server workflow management systems have an intrinsic scalability limitation, the central server, which represents a bottleneck for large-scale applications. This s...
Roberto Silveira Silva Filho, Jacques Wainer, Edmu...
WETICE
1999
IEEE
15 years 5 months ago
Here Is the Knowledge-Where Should I Put It?
In order to design useful knowledge media spaces to knowledge workers it is essential that we understand the nature of the work conducted and the knowledge applied in real setting...
Peter H. Carstensen, Ulrika Snis
COOPIS
1998
IEEE
15 years 5 months ago
Scheduling Non-Enforceable Contracts among Autonomous Agents
With the emergence of fast and standardized communication infrastructures over which separately designed agents of different organizations can interact in real-time, there is an i...
Thomas Tesch, Karl Aberer
IPPS
1998
IEEE
15 years 5 months ago
Fault-Tolerant Switched Local Area Networks
The RAIN (Reliable Array of Independent Nodes) project at Caltech is focusing on creating highly reliable distributed systems by leveraging commercially available personal compute...
Paul S. LeMahieu, Vasken Bohossian, Jehoshua Bruck