Sciweavers

2282 search results - page 412 / 457
» Distributed Cryptographic Computing on Grid
Sort
View
135
Voted
SAC
2006
ACM
15 years 8 months ago
Proactive resilience through architectural hybridization
In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusiontolerant system under the asynchronous model. This result f...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...
167
Voted
GPC
2007
Springer
15 years 8 months ago
Design of PeerSum: A Summary Service for P2P Applications
Sharing huge databases in distributed systems is inherently difficult. As the amount of stored data increases, data localization techniques become no longer sufficient. A more ef...
Rabab Hayek, Guillaume Raschia, Patrick Valduriez,...
ISCC
2006
IEEE
154views Communications» more  ISCC 2006»
15 years 8 months ago
Decentralized Load Balancing for Highly Irregular Search Problems
In this paper, we present a Dynamic Load Balancing (DLB) policy for problems characterized by a highly irregular search tree, whereby no reliable workload prediction is available....
Giuseppe Di Fatta, Michael R. Berthold
ESCIENCE
2005
IEEE
15 years 8 months ago
A Peer-to-Peer Extension of Network-Enabled Server Systems
DIET (Distributed Interactive Engineering Toolbox) is a set of hierarchical components to design Network Enabled Server (NES) systems. In these systems, clients ask to agents (dis...
Eddy Caron, Frederic Desprez, Cédric Tedesc...
132
Voted
SACMAT
2004
ACM
15 years 8 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...