Sciweavers

1727 search results - page 194 / 346
» An Approach to Performance Prediction for Parallel Applicati...
Sort
View
GPC
2007
Springer
15 years 4 months ago
Design of PeerSum: A Summary Service for P2P Applications
Sharing huge databases in distributed systems is inherently difficult. As the amount of stored data increases, data localization techniques become no longer sufficient. A more ef...
Rabab Hayek, Guillaume Raschia, Patrick Valduriez,...
ACSAC
1998
IEEE
15 years 2 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
ICC
2009
IEEE
164views Communications» more  ICC 2009»
14 years 7 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
IMSCCS
2007
IEEE
15 years 4 months ago
An Innovative Simulation Approach for Water Mediated Attraction Based on Grid Computing
In order to investigate the behavior of the solvation, particularly, to quantify the solvent effects on the properties of solutes on a molecular basis, several simulation approach...
Zhifeng Yun, Samuel J. Keasler, Maoyuan Xie, Zhou ...
IJHPCA
2006
77views more  IJHPCA 2006»
14 years 10 months ago
An Interoperability Approach to System Software, Tools, and Libraries for Clusters
Systems software for clusters typically derives from a multiplicity of sources: the kernel itself, software associated with a particular distribution, site-specific purchased or o...
Ewing L. Lusk, Narayan Desai, Rick Bradshaw, Andre...