Sciweavers

5790 search results - page 579 / 1158
» Distributed programming with distributed authorization
Sort
View
STOC
2003
ACM
90views Algorithms» more  STOC 2003»
16 years 5 months ago
Work-competitive scheduling for cooperative computing with dynamic groups
The problem of cooperatively performing a set of t tasks in a decentralized setting where the computing medium is subject to failures is one of the fundamental problems in distrib...
Chryssis Georgiou, Alexander Russell, Alexander A....
CDC
2008
IEEE
128views Control Systems» more  CDC 2008»
15 years 11 months ago
Time-robust discrete control over networked Loosely Time-Triggered Architectures
In this paper we consider Loosely Time-Triggered Architectures (LTTA) as a networked infrastructure for deploying discrete control. LTTA are distributed architectures in which 1/ ...
Paul Caspi, Albert Benveniste
IPPS
2008
IEEE
15 years 11 months ago
Heterogenous dating service with application to rumor spreading
Peer-to-Peer overlay networks have proven their efficiency for storing and retrieving data at large scale, but new services are required to take the actual performances of resour...
Olivier Beaumont, Philippe Duchon, Miroslaw Korzen...
CMMR
2007
Springer
174views Music» more  CMMR 2007»
15 years 11 months ago
Between Mapping, Sonification and Composition: Responsive Audio Environments in Live Performance
This paper describes recent work on a large-scale, interactive theater performance entitled Schwelle as a platform to pose critical questions around the conception, design and imp...
Christopher L. Salter, Marije A. J. Baalman, Danie...
177
Voted
XMLSEC
2003
ACM
15 years 10 months ago
An access control framework for business processes for web services
Business Processes for Web Services are the new paradigm for the lightweight integration of business from different enterprises. Whereas the security and access control policies ...
Hristo Koshutanski, Fabio Massacci