Sciweavers

5790 search results - page 717 / 1158
» Distributed programming with distributed authorization
Sort
View
112
Voted
COMPUTER
2004
120views more  COMPUTER 2004»
15 years 3 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
AAMAS
2000
Springer
15 years 3 months ago
Coordinating Mutually Exclusive Resources using GPGP
Hospital Patient Scheduling is an inherently distributed problem because of the way real hospitals are organized. As medical procedures have become more complex, and their associat...
Keith Decker, Jinjiang Li
150
Voted
INFSOF
2000
91views more  INFSOF 2000»
15 years 3 months ago
An operational approach to the design of workflow systems
We construct models as an aid to our thought process. A particular class of models, operational models, can be used for simulation and prototyping. The Opj modeling language is su...
Rakesh Agarwal, Giorgio Bruno, Marco Torchiano
JGAA
2000
179views more  JGAA 2000»
15 years 3 months ago
Approximation Algorithms for Some Graph Partitioning Problems
This paper considers problems of the following type: given an edgeweighted k-colored input graph with maximum color class size c, find a minimum or maximum c-way cut such that eac...
George He, Jiping Liu, Cheng Zhao
JACM
2002
87views more  JACM 2002»
15 years 3 months ago
Bounded concurrent timestamp systems using vector clocks
Abstract. Shared registers are basic objects used as communication mediums in asynchronous concurrent computation. A concurrent timestamp system is a higher typed communication obj...
Sibsankar Haldar, Paul M. B. Vitányi