Sciweavers

988 search results - page 139 / 198
» Cryptographic access control in a distributed file system
Sort
View
ICLP
2007
Springer
15 years 3 months ago
User-Definable Resource Bounds Analysis for Logic Programs
We present a static analysis that infers both upper and lower bounds on the usage that a logic program makes of a set of user-definable resources. The inferred bounds will in gener...
Jorge Navas, Edison Mera, Pedro López-Garc&...
NDSS
2000
IEEE
15 years 4 months ago
Accountability and Control of Process Creation in Metasystems
The distinguishing feature of a metasystem is middleware that facilitates viewing a collection of large, distributed, heterogeneous resources as a single virtual machine, where ea...
Marty Humphrey, Frederick Knabe, Adam Ferrari, And...
CORR
2008
Springer
105views Education» more  CORR 2008»
14 years 12 months ago
Integrating OPC Data into GSN Infrastructures
This paper presents the design and the implementation of an interface software component between OLE for Process Control (OPC) formatted data and the Global ...
Olivier Passalacqua, Eric Benoit, Marc-Philippe Hu...
CLUSTER
2009
IEEE
15 years 3 months ago
24/7 Characterization of petascale I/O workloads
Abstract--Developing and tuning computational science applications to run on extreme scale systems are increasingly complicated processes. Challenges such as managing memory access...
Philip H. Carns, Robert Latham, Robert B. Ross, Ka...
SISW
2005
IEEE
15 years 5 months ago
The Consequences of Decentralized Security in a Cooperative Storage System
Traditional storage systems have considered security as a problem to be solved at the perimeter: once a user is authenticated, each device internal to the system trusts the decisi...
Douglas Thain, Christopher Moretti, Paul Madrid, P...