Sciweavers

ITCC
2005
IEEE
13 years 9 months ago
An Autonomous Pricing Strategy toward Market Economy in Computational Grids
One of the key steps in economy based grid resource allocation is to make reasonable prices for the grid resources. For resources’ prices decide the resource flow in the Grid, f...
Yang Jin, Shoubao Yang, Maosheng Li, Qianfei Fu
ITCC
2005
IEEE
13 years 9 months ago
A Web Recommendation System Based on Maximum Entropy
We propose a Web recommendation system based on a maximum entropy model. Under the maximum entropy principle, we can combine multiple levels of knowledge about users’ navigation...
Xin Jin, Bamshad Mobasher, Yanzan Zhou
ITCC
2005
IEEE
13 years 9 months ago
Computing Molecular Potential Energy Surface with DIET
New developments in the field of theoretical chemistry require the computation of numerous Molecular Potential Energy Surfaces (PESs) to generate adequate quantum force field pa...
Emmanuel Jeannot, Gerald Monard
ITCC
2005
IEEE
13 years 9 months ago
Formalisation and implementation of Access control models
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Mathieu Jaume, Charles Morisset
ITCC
2005
IEEE
13 years 9 months ago
Using Formal Concept Analysis to Establish Model Dependencies
models evolve at different levels of abstraction, from the requirements specification to development of the source code. The models underlying this process are related and their ...
Igor Ivkovic, Kostas Kontogiannis
ITCC
2005
IEEE
13 years 9 months ago
A New Electronic Cash Model
- With the development of e-commerce, choosing a proper electronic payment method has become more and more important. Competing with other payment methods on the Internet, electron...
Xiaosong Hou, Chik How Tan
ITCC
2005
IEEE
13 years 9 months ago
A Scalable and High Performance Elliptic Curve Processor with Resistance to Timing Attacks
This paper presents a high performance and scalable elliptic curve processor which is designed to be resistant against timing attacks. The point multiplication algorithm (double-a...
Alireza Hodjat, David Hwang, Ingrid Verbauwhede
ITCC
2005
IEEE
13 years 9 months ago
A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems
The popularity of distributed file systems continues to grow. Reasons they are preferred over traditional centralized file systems include fault tolerance, availability, scalabili...
Ragib Hasan, Zahid Anwar, William Yurcik, Larry Br...
ITCC
2005
IEEE
13 years 9 months ago
Analyze Grid from the Perspective of a Computing System
This paper presents a service-based grid computing model which emphasizes that a grid is a special computing system. By comparing this model with the traditional computing system ...
Guoshun Hao, Shilong Ma, Haoming Guo, Xiaolong Wu,...
ITCC
2005
IEEE
13 years 9 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...