Sciweavers

SRDS
2010
IEEE
13 years 3 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
SRDS
2010
IEEE
13 years 3 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
SRDS
2010
IEEE
13 years 3 months ago
Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor Networks
Data aggregation scheduling, or convergecast, is a fundamental pattern of communication in wireless sensor networks (WSNs), where sensor nodes aggregate and relay data to a sink no...
Arshad Jhumka
SRDS
2010
IEEE
13 years 3 months ago
VMDriver: A Driver-Based Monitoring Mechanism for Virtualization
Monitoring virtual machine (VM) is an essential function for virtualized platforms. Existing solutions are either coarse-grained
Guofu Xiang, Hai Jin, Deqing Zou, Xinwen Zhang, Sh...
SRDS
2010
IEEE
13 years 3 months ago
A Cooperative Sampling Approach to Discovering Optimal Configurations in Large Scale Computing Systems
With the growing scale of current computing systems, traditional configuration tuning methods become less effective because they usually assume a small number of parameters in the...
Haifeng Chen, Guofei Jiang, Hui Zhang 0002, Kenji ...
Operating System
Top of PageReset Settings