Sciweavers

1587 search results - page 141 / 318
» Access Control for Shared Resources
Sort
View
86
Voted
CSCW
2000
ACM
15 years 5 months ago
Designing to support adversarial collaboration
We investigate the phenomenon of adversarial collaboration, through field studies of a legal firm. Adversarial collaboration requires that people with opposing goals come to agree...
Andrew L. Cohen, Debra Cash, Michael J. Muller
123
Voted
CCGRID
2006
IEEE
15 years 6 months ago
INTCTD: A Peer-to-Peer Approach for Intrusion Detection
In this paper we propose a peer-to-peer (P2P) prototype (INTCTD) for intrusion detection over an overlay network. INTCTD is a distributed system based on neural networks for detec...
Catalin Dumitrescu
80
Voted
MICRO
2006
IEEE
96views Hardware» more  MICRO 2006»
15 years 20 days ago
Molecular Caches: A caching structure for dynamic creation of application-specific Heterogeneous cache regions
CMPs enable simultaneous execution of multiple applications on the same platforms that share cache resources. Diversity in the cache access patterns of these simultaneously execut...
Keshavan Varadarajan, S. K. Nandy, Vishal Sharda, ...
121
Voted
COMPUTER
2002
196views more  COMPUTER 2002»
15 years 16 days ago
Grid Services for Distributed System Integration
ions and concepts that let applications access and share resources and services across distributed, wide area networks, while providing common security semantics, distributed resou...
Ian T. Foster, Carl Kesselman, Jeffrey M. Nick, St...
130
Voted
TON
2012
13 years 3 months ago
Power Control for Cognitive Radio Networks: Axioms, Algorithms, and Analysis
—The deployment of cognitive radio networks enables efficient spectrum sharing and opportunistic spectrum access. It also presents new challenges to the classical problem of int...
Siamak Sorooshyari, Chee Wei Tan, Mung Chiang