Sciweavers

340 search results - page 63 / 68
» A Simple User Authentication Scheme for Grid Computing
Sort
View
SODA
2008
ACM
108views Algorithms» more  SODA 2008»
14 years 11 months ago
Price based protocols for fair resource allocation: convergence time analysis and extension to Leontief utilities
We analyze several distributed, continuous time protocols for a fair allocation of bandwidths to flows in a network (or resources to agents). Our protocols converge to an allocati...
Ashish Goel, Hamid Nazerzadeh
99
Voted
INFOCOM
2011
IEEE
14 years 1 months ago
Continuous multi-dimensional top-k query processing in sensor networks
—Top-k query has long been an important topic in many fields of computer science. Efficient implementation of the top-k queries is the key for information searching. With the n...
Hongbo Jiang, Jie Cheng, Dan Wang, Chonggang Wang,...
MOBISYS
2004
ACM
15 years 9 months ago
Mimic: Raw Activity Shipping for File Synchronization in Mobile File Systems
In this paper, we consider the problem of file synchronization when a mobile host shares files with a backbone file server in a network file system. Several diff schemes have been...
Tae-Young Chang, Aravind Velayutham, Raghupathy Si...
BMCBI
2008
129views more  BMCBI 2008»
14 years 9 months ago
EMAAS: An extensible grid-based Rich Internet Application for microarray data analysis and management
Background: Microarray experimentation requires the application of complex analysis methods as well as the use of non-trivial computer technologies to manage the resultant large d...
Geraint Barton, J. C. Abbott, Norie Chiba, D. W. H...
PARLE
1992
15 years 1 months ago
Characterizing the Paralation Model using Dynamic Assignment
Collection-oriented languages provide high-level constructs for describing computations over collections. These languages are becoming increasingly popular with the advent of massi...
Eric T. Freeman, Daniel P. Friedman