Sciweavers

5348 search results - page 913 / 1070
» Time-critical information services
Sort
View
CCS
2007
ACM
15 years 8 months ago
Non-volatile memory and disks: avenues for policy architectures
As computing models change, so too do the demands on storage. Distributed and virtualized systems introduce new vulnerabilities, assumptions, and performance requirements on disks...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
CONTEXT
2007
Springer
15 years 8 months ago
Adaptive and Context-aware Scenarios for Technology Enhanced Learning System based on a Didactical Theory and a Hierarchical Tas
Among the main issues of future technology-enhanced learning systems, we can mention the following ones: the ability to reuse learning resources (learning objects, tools and servic...
Jean-Louis Tetchueng, Serge Garlatti, Sylvain Laub...
FC
2007
Springer
117views Cryptology» more  FC 2007»
15 years 8 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
GRID
2007
Springer
15 years 8 months ago
Dynamic, context-aware, least-privilege grid delegation
— Performing delegation in large scale, dynamic and distributed environments with large numbers of shared resources is more challenging than inside local administrative domains. ...
Mehran Ahsant, Jim Basney, S. Lennart Johnsson
HPCC
2007
Springer
15 years 8 months ago
Multi-domain Topology-Aware Grouping for Application-Layer Multicast
Application-layer multicast (ALM) can solve most of the problems of IP-based multicast. Topology-aware approach of ALM is more attractive because it exploits underlying network top...
Jianqun Cui, Yanxiang He, Libing Wu, Naixue Xiong,...