Sciweavers

2282 search results - page 385 / 457
» Distributed Cryptographic Computing on Grid
Sort
View
123
Voted
ACSC
2005
IEEE
15 years 7 months ago
Auction Based Resource Negotiation in NOMAD
The challenges faced by mobile and distributed applications include the ability to discover and negotiate for the resources required for execution. The NOMAD (Negotiated Object Mo...
Kris Bubendorfer, John H. Hine
SPAA
1990
ACM
15 years 5 months ago
Low Overhead Parallel Schedules for Task Graphs
d Abstract) Richard J. Anderson Paul Beame Walter L. Ruzzo Department of Computer Science and Engineering University of Washingtoni We introduce a task scheduling model which is u...
Richard J. Anderson, Paul Beame, Walter L. Ruzzo
86
Voted
CCGRID
2008
IEEE
15 years 8 months ago
Performance and Availability Tradeoffs in Replicated File Systems
Replication is a key technique for improving fault tolerance. Replication can also improve application performance under some circumstances, but can have the opposite effect under...
Jiaying Zhang, Peter Honeyman
GCC
2005
Springer
15 years 7 months ago
A Worm Behavioral Approach to Susceptible Host Detection
A new detection approach based on worm behaviors for IDS anti-worm is presented. By the method, the susceptible hosts probed by worms can be detected, and then an immediate counter...
BaiLing Wang, Binxing Fang, Xiao-chun Yun
GCC
2005
Springer
15 years 7 months ago
Collaborating Semantic Link Network with Resource Space Model
The Semantic Link Network model SLN and Resource Space Model RSM are semantic models proposed separately for effectively specifying and managing versatile resources across the Inte...
Yunpeng Xing, Jie Liu, Xiaoping Sun, Erlin Yao