Sciweavers

733 search results - page 107 / 147
» A Logic Programming View of Authorization in Distributed Sys...
Sort
View
151
Voted
HPDC
2010
IEEE
15 years 4 months ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim
MAAMAW
1994
Springer
15 years 7 months ago
What Ants Cannot Do
What is the relation between the complexity of agents and the complexity of the goals that they can achieve? It is argued on the basis of a fundamental conservation of complexity ...
Eric Werner
IPPS
2006
IEEE
15 years 9 months ago
Modeling and executing master-worker applications in component models
— This paper describes work in progress to extend component models to support Master-Worker applications and to let them to be executed on Grid infrastructures. The proposed appr...
Hinde-Lilia Bouziane, Christian Pérez, Thie...
171
Voted
CCS
2010
ACM
15 years 4 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
C5
2008
IEEE
15 years 10 months ago
Toward A More Scalable End-User Scripting Language
End-user scripting languages are relatively easy to learn, but have limited expressive power. Tile-based scripting systems are particularly accessible to beginners, but usually ar...
Alessandro Warth, Takashi Yamamiya, Yoshiki Ohshim...