Java remote method invocation

Results: 58



#Item
11Decentralized Jini Security Pasi Eronen and Pekka Nikander Helsinki University of Technology {pasi.eronen, pekka.nikander}@hut.fi  Abstract

Decentralized Jini Security Pasi Eronen and Pekka Nikander Helsinki University of Technology {pasi.eronen, pekka.nikander}@hut.fi Abstract

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:16:52
12Microsoft Word - IBSAI NNets, Gene, NLP.doc

Microsoft Word - IBSAI NNets, Gene, NLP.doc

Add to Reading List

Source URL: www.foibg.com

Language: English - Date: 2015-02-02 08:45:44
13Requirements for and Evaluation of RMI Protocols for Scientific Computing∗ Madhusudhan Govindaraju, Aleksander Slominski, Venkatesh Choppella, Randall Bramley, Dennis Gannon Department of Computer Science Indiana Unive

Requirements for and Evaluation of RMI Protocols for Scientific Computing∗ Madhusudhan Govindaraju, Aleksander Slominski, Venkatesh Choppella, Randall Bramley, Dennis Gannon Department of Computer Science Indiana Unive

Add to Reading List

Source URL: www.extreme.indiana.edu

Language: English - Date: 2002-02-12 19:36:44
14CS255: Cryptography and Computer Security  Winter 2003 Programming Project #1 Due: Tuesday, February 25th 2003, 11:59pm

CS255: Cryptography and Computer Security Winter 2003 Programming Project #1 Due: Tuesday, February 25th 2003, 11:59pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-02-10 15:05:12
15CS255: Cryptography and Computer Security  Winter 2000 Programming Project #1 Due: Monday, February 21st 2000, 11:59pm

CS255: Cryptography and Computer Security Winter 2000 Programming Project #1 Due: Monday, February 21st 2000, 11:59pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-02-07 14:41:45
16CS255: Cryptography and Computer Security  Winter 2004 Programming Project #1 Due: Monday, February 9th, 2004.

CS255: Cryptography and Computer Security Winter 2004 Programming Project #1 Due: Monday, February 9th, 2004.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-01-26 17:01:34
17VMware vRealize Operations for Horizon Security vRealize Operations for Horizon 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is

VMware vRealize Operations for Horizon Security vRealize Operations for Horizon 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is

Add to Reading List

Source URL: pubs.vmware.com

Language: English
18An automatically-tuned sorting library

An automatically-tuned sorting library

Add to Reading List

Source URL: www.ux.uis.no

Language: English - Date: 2014-11-29 05:01:28
19Scalability and Performance of JADE Message Transport System E.Cortese F.Quarta

Scalability and Performance of JADE Message Transport System E.Cortese F.Quarta

Add to Reading List

Source URL: jade.tilab.com

Language: English - Date: 2014-07-11 08:15:22
20Introduction to Java Distributed Objects - Using RMI and CORBA  Welcome to the Course Description: This course introduces how to program distributed objects using Java Remote Method Invocation (RMI) and using the Common

Introduction to Java Distributed Objects - Using RMI and CORBA Welcome to the Course Description: This course introduces how to program distributed objects using Java Remote Method Invocation (RMI) and using the Common

Add to Reading List

Source URL: www.digilife.be

Language: English - Date: 2003-02-16 08:38:42