The globe infrastructure directory service

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The globe infrastructure directory service

To implement adaptive replication strategies for Web documents, we have developed a wide area resource management system. This system allows servers to be managed on a local and global level. On a local level the system manages information about the resources and services provided by the servers, while on a global level the system allows servers to be searched for, added to, and removed from th...

متن کامل

Directory Service for GroupWork

ACKNOWLEDGEMENT: This effort has been sponsored by Defense Advance Research Projects Agency (DARPA), under contract No. MDA972-88-C-0047 for DARPA Initiative in Concurrent Engineering (DICE).

متن کامل

DNS aware multicast session directory service

Although IP-multicast has existed in some form since the inception of IPv4, it has not enjoyed widespread use. Much of this can be explained by lack of the necessary protocols for use of multicast addresses. While IGMP has matured over the years, it still lacks elements necessary to popularize IP-multicast, due to the layer at which it operates. We believe that increased usability at the applic...

متن کامل

Directory Service Provided by DSCloud Platform

When there are huge volumes of information dispersing in the various machines, global directory services are required for the users. DSCloud Platform provides the global directory service , in which the directories are created and maintained by the users themselves. In this paper, we describe the DSCloud Platform directory service’s functions, authorization, mounting users’ local file systems ,...

متن کامل

BlueSnarf Revisited: OBEX FTP Service Directory Traversal

As mobile operating systems reach the same level of complexity of computer operating systems, these may be affected by the same vulnerabilities and may be subject to the same kind of attacks. Bluetooth provides connectivity to a mobile phone but this network can also be used as a channel to deploy attacks and access its resources, such as personal information, confidential files or the possibil...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Communications

سال: 2002

ISSN: 0140-3664

DOI: 10.1016/s0140-3664(01)00420-0