Sciweavers

1363 search results - page 192 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
TON
2008
75views more  TON 2008»
14 years 11 months ago
TVA: a DoS-limiting network architecture
We motivate the capability approach to network denial-of-service (DoS) attacks, and evaluate the TVA architecture which builds on capabilities. With our approach, rather than send ...
Xiaowei Yang, David Wetherall, Thomas E. Anderson
COMPUTER
2004
120views more  COMPUTER 2004»
14 years 11 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
AAMAS
2000
Springer
14 years 11 months ago
Coordinating Mutually Exclusive Resources using GPGP
Hospital Patient Scheduling is an inherently distributed problem because of the way real hospitals are organized. As medical procedures have become more complex, and their associat...
Keith Decker, Jinjiang Li
86
Voted
CORR
2002
Springer
156views Education» more  CORR 2002»
14 years 11 months ago
MPICH-G2: A Grid-Enabled Implementation of the Message Passing Interface
Application development for distributed-computing ``Grids'' can benefit from tools that variously hide or enable application-level management of critical aspects of the ...
Nicholas T. Karonis, Brian R. Toonen, Ian T. Foste...
INFSOF
2000
91views more  INFSOF 2000»
14 years 11 months ago
An operational approach to the design of workflow systems
We construct models as an aid to our thought process. A particular class of models, operational models, can be used for simulation and prototyping. The Opj modeling language is su...
Rakesh Agarwal, Giorgio Bruno, Marco Torchiano