Sciweavers

5790 search results - page 861 / 1158
» Distributed programming with distributed authorization
Sort
View
153
Voted
IEEECIT
2010
IEEE
15 years 17 days ago
Using Chemical Metaphor to Express Workflow and Service Orchestration
Abstract--Nowadays, novel applications, such as personalized e-commerce services, call for cooperation across enterprise boundaries. Service-Oriented-Architecture (SOA) forms a sol...
Chen Wang, Jean-Louis Pazat
125
Voted
ICICS
2009
Springer
15 years 11 days ago
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model
The Trusted Computing Group (TCG) proposed remote attestation as a solution for establishing trust among distributed applications. However, current TCG attestation architecture req...
Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei S...
130
Voted
CDC
2010
IEEE
14 years 9 months ago
A hierarchical approach to energy management in data centers
This paper concerns the management of energy in data centers using a cyber-physical model that supports the coordinated control of both computational and thermal (cooling) resource...
Luca Parolini, Emanuele Garone, Bruno Sinopoli, Br...
124
Voted
TIT
2010
158views Education» more  TIT 2010»
14 years 9 months ago
Belief propagation, Dykstra's algorithm, and iterated information projections
Belief propagation is shown to be an instance of a hybrid between two projection algorithms in the convex programming literature: Dykstra's algorithm with cyclic Bregman proje...
John MacLaren Walsh, Phillip A. Regalia
104
Voted
ICASSP
2011
IEEE
14 years 6 months ago
Transmit beamspace design for direction finding in colocated MIMO radar with arbitrary receive array
The transmit beamspace design problem for colocated multiple-input multiple-output (MIMO) radar is considered. We show that the MIMO radar transmit beampattern can be designed so ...
Arash Khabbazibasmenj, Aboulnasr Hassanien, Sergiy...