Sciweavers

883 search results - page 133 / 177
» An Access Control Model Based on Distributed Knowledge Manag...
Sort
View
104
Voted
ICAC
2006
IEEE
15 years 6 months ago
The Laundromat Model for Autonomic Cluster Computing
Traditional High Performance Computing systems require extensive management and suffer from security and configuration problems. This paper presents a new clustermanagement syste...
Jacob Gorm Hansen, Eske Christiansen, Eric Jul
EEMMAS
2007
Springer
15 years 6 months ago
Engineering Contextual Information for Pervasive Multiagent Systems
Multiagent systems for mobile and pervasive computing should extensively exploit contextual information both to adapt to user needs and to enable autonomic behavior. This raises th...
Gabriella Castelli, Marco Mamei, Franco Zambonelli
88
Voted
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 4 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
135
Voted
IPPS
2010
IEEE
14 years 10 months ago
Robust control-theoretic thermal balancing for server clusters
Thermal management is critical for clusters because of the increasing power consumption of modern processors, compact server architectures and growing server density in data center...
Yong Fu, Chenyang Lu, Hongan Wang
TMC
2010
150views more  TMC 2010»
14 years 11 months ago
Handling Mobility in Wireless Sensor and Actor Networks
— In Wireless Sensor and Actor Networks (WSANs), the collaborative operation of sensors enables the distributed sensing of a physical phenomenon, while actors collect and process...
Tommaso Melodia, Dario Pompili, Ian F. Akyildiz