Sciweavers

2199 search results - page 303 / 440
» Adapting Privacy-Preserving Computation to the Service Provi...
Sort
View
CHI
2008
ACM
16 years 1 months ago
Evaluation of a role-based approach for customizing a complex development environment
Coarse-grained approaches to customization allow the user to enable or disable groups of features at once, rather than individual features. While this may reduce the complexity of...
Leah Findlater, Joanna McGrenere, David Modjeska
CIKM
2004
Springer
15 years 6 months ago
The robustness of content-based search in hierarchical peer to peer networks
Hierarchical peer to peer networks with multiple directory services are an important architecture for large-scale file sharing due to their effectiveness and efficiency. Recent ...
M. Elena Renda, Jamie Callan
SACMAT
2011
ACM
14 years 3 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali
115
Voted
NAS
2010
IEEE
14 years 11 months ago
Inter-vehicular Communication Systems, Protocols and Middleware
— Inter-vehicular communication is an important research area that is rapidly growing due to considerable advances in mobile and wireless communication technologies, as well as t...
Imad Jawhar, Nader Mohamed, Liren Zhang
109
Voted
PVM
2005
Springer
15 years 6 months ago
A Peer-to-Peer Framework for Robust Execution of Message Passing Parallel Programs on Grids
Abstract. This paper presents P2P-MPI, a middleware aimed at computational grids. From the programmer point of view, P2P-MPI provides a message-passing programming model which enab...
Stéphane Genaud, Choopan Rattanapoka