Sciweavers

871 search results - page 19 / 175
» A Decentralized Authorization Architecture
Sort
View
HPCC
2009
Springer
15 years 2 months ago
C2Cfs: A Collective Caching Architecture for Distributed File Access
—In this paper we present C2Cfs - a decentralized collective caching architecture for distributed filesystems. C2Cfs diverges from the traditional client-server model and advoca...
Andrey Ermolinskiy, Renu Tewari
AH
2004
Springer
15 years 3 months ago
Using SiteRank for Decentralized Computation of Web Document Ranking
Abstract. The PageRank algorithm demonstrates the significance of the computation of document ranking of general importance or authority in Web information retrieval. However, doi...
Jie Wu, Karl Aberer
73
Voted
IOR
2006
72views more  IOR 2006»
14 years 9 months ago
Inventory Policies in a Decentralized Assembly System
We consider a system in which a single finished good is assembled from two components. Demand for the finished product is stochastic and stationary, and procurement and assembly l...
Fernando Bernstein, Gregory A. DeCroix
ACMDIS
2000
ACM
15 years 2 months ago
The Social Life of Engineering Authorizations
We may view documents, not only as “containers” for information, but also as active participants in organizing and sustaining communities. This paper discusses our experiences...
William A. Stubblefield, Karen S. Rogers
SOSP
2003
ACM
15 years 6 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...