Sciweavers

2058 search results - page 354 / 412
» Concast: Design and Implementation of a New Network Service
Sort
View
SACMAT
2004
ACM
15 years 5 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
COMPSAC
2002
IEEE
15 years 4 months ago
SIFA: A Scalable File System with Intelligent File Allocation
In this paper, we propose and evaluate a new NAS based system which is a consolidated file system in a network environment. The consolidated file system utilizes storage boxes c...
Hsiao-Ping Tsai, Jiun-Long Huang, Cheng-Ming Chao,...
ERSHOV
2006
Springer
15 years 3 months ago
Streaming Networks for Coordinating Data-Parallel Programs
A new coordination language for distributed data-parallel programs is presented, call SNet. The intention of SNet is to introduce advanced structuring techniques into a coordinatio...
Clemens Grelck, Sven-Bodo Scholz, Alexander V. Sha...
WWW
2004
ACM
16 years 15 days ago
Web customization using behavior-based remote executing agents
ReAgents are remotely executing agents that customize Web browsing for non-standard resource-limited clients. A reAgent is essentially a "one-shot" mobile agent that act...
Eugene Hung, Joseph Pasquale
ICDCS
2009
IEEE
15 years 9 months ago
The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
Chia-Wei Chang, Seungjoon Lee, B. Lin, Jia Wang