Sciweavers

1286 search results - page 88 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
OOPSLA
2005
Springer
15 years 8 months ago
DOSC: dispersed operating system computing
Over the past decade the sheer size and complexity of traditional operating systems have prompted a wave of new approaches to help alleviate the services provided by these operati...
Ramesh K. Karne, Karthick V. Jaganathan, Nelson Ro...
SAIG
2001
Springer
15 years 7 months ago
MetaKlaim: Meta-programming for Global Computing
Most foundational models for global computing have focused on the spatial dimension of computations, however global computing requires also new ways of thinking about the temporal ...
Gian Luigi Ferrari, Eugenio Moggi, Rosario Puglies...
SASN
2003
ACM
15 years 8 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
CISIS
2009
IEEE
15 years 10 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
SOSP
1997
ACM
15 years 4 months ago
Distributed Schedule Management in the Tiger Video Fileserver
Tiger is a scalable, fault-tolerant video file server constructed from a collection of computers connected by a switched network. All content files are striped across all of the c...
William J. Bolosky, Robert P. Fitzgerald, John R. ...