Sciweavers

471 search results - page 18 / 95
» A Flexible Trust Model for Distributed Service Infrastructur...
Sort
View
129
Voted
AC
1999
Springer
15 years 6 months ago
Integrating Group Communication with Transactions for Implementing Persistent Replicated Objects
A widely used computational model for constructing fault-tolerant distributed applications employs atomic transactions for controlling operations on persistent objects. There has ...
Mark C. Little, Santosh K. Shrivastava
HPCC
2010
Springer
15 years 3 months ago
Managing Peak Loads by Leasing Cloud Infrastructure Services from a Spot Market
Dedicated computing clusters are typically sized based on an expected average workload over a period of years, rather than on peak workloads, which might exist for relatively shor...
Michael Mattess, Christian Vecchiola, Rajkumar Buy...
SUTC
2006
IEEE
15 years 8 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
COMCOM
2010
136views more  COMCOM 2010»
15 years 2 months ago
D-MORE: Dynamic mesh-based overlay peer-to-peer infrastructure
Traditionally, Internet Service Providers (ISPs) have to interconnect with content providers to provide network services to customers. The current business model that connectivity...
Jun Lei, Xiaoming Fu, Dieter Hogrefe
126
Voted
GCC
2003
Springer
15 years 7 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou