Sciweavers

620 search results - page 2 / 124
» grid 2005
Sort
View
ESCIENCE
2005
IEEE
13 years 10 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson
ESWS
2005
Springer
13 years 10 months ago
The Semantic Grid: Past, Present and Future
—Grid computing offers significant enhancements to our capabilities for computation, information processing and collaboration, and has exciting ambitions in many fields of endeav...
David De Roure
OTM
2005
Springer
13 years 10 months ago
Providing Autonomic Features to a Data Grid
Autonomic and Grid computing are complementary, in the sense that complex grid environments can take advantage of the features provided by autonomic computing and on the other hand...
María S. Pérez, Alberto Sánch...
EGC
2005
Springer
13 years 10 months ago
Optimizing Grid Application Setup Using Operating System Mobility
This paper is about optimizing Grid application setup by allowing a user to configure a Grid application on her own PC and thereafter migrating the entire application onto the Gri...
Jacob Gorm Hansen, Eric Jul
DATE
2005
IEEE
131views Hardware» more  DATE 2005»
13 years 6 months ago
Performance Driven Decoupling Capacitor Allocation Considering Data and Clock Interactions
— We propose a sensitivity-based method to allocate decaps incorporating leakage constraints and tighter data and clock interactions. The proposed approach attempts to allocate d...
Ajith Chandy, Tom Chen