Sciweavers

303 search results - page 1 / 61
» Resource Usage Analysis and Its Application to Resource Cert...
Sort
View
FOSAD
2009
Springer
13 years 11 months ago
Resource Usage Analysis and Its Application to Resource Certification
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
GRID
2006
Springer
13 years 4 months ago
Shibboleth-based Access to and Usage of Grid Resources
Security underpins Grids and e-Research. Without a robust, reliable and simple Grid security infrastructure combined with commonly accepted security practices, large portions of th...
Richard O. Sinnott, Jipu Jiang, J. P. Watt, Oluwaf...
APLAS
2009
ACM
13 years 11 months ago
Asymptotic Resource Usage Bounds
When describing the resource usage of a program, it is usual to talk in asymptotic terms, such as the well-known “big O” notation, whereby we focus on the behaviour of the prog...
Elvira Albert, Diego Alonso, Puri Arenas, Samir Ge...
ICSOC
2009
Springer
13 years 2 months ago
EC2 Performance Analysis for Resource Provisioning of Service-Oriented Applications
Abstract. Cloud computing is receiving increasingly attention as it provides infinite resource capacity and "pay-as-you-go" resource usage pattern to hosted applications....
Dejun Jiang, Guillaume Pierre, Chi-Hung Chi
COMPSEC
2004
104views more  COMPSEC 2004»
13 years 4 months ago
Formal support for certificate management policies
Traditionally, creation and revocation of certificates are governed by policies that are carried manually, off-line, by trusted agents. This approach to certificate management is ...
Victoria Ungureanu