Software configuration management (SCM) products have evolved over the years and have become large and powerful, but they are not flexible enough to allow the user to pick the kind...
This paper analyzes security problems existing in Grid Computing System and describes the security mechanism in Grid Computing System. After briefly introducing the security abstra...
Xiangming Fang, Shoubao Yang, Leitao Guo, Lei Zhan...
We present a generalization of conventional artificial neural networks that allows for a functional equivalence to multi-expert systems. The new model provides an architectural fr...
Comparing with the rapidly increasing acquiring technology for remotely sensed data, the data processing technologies have been following behind, especially in computing speed and ...
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...