Sciweavers

352 search results - page 18 / 71
» Establishing norms with metanorms in distributed computation...
Sort
View
EUC
2007
Springer
15 years 4 months ago
Obligations for Privacy and Confidentiality in Distributed Transactions
Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no n...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
OOPSLA
2005
Springer
15 years 3 months ago
X10: an object-oriented approach to non-uniform cluster computing
It is now well established that the device scaling predicted by Moore’s Law is no longer a viable option for increasing the clock frequency of future uniprocessor systems at the...
Philippe Charles, Christian Grothoff, Vijay A. Sar...
WEBI
2010
Springer
14 years 8 months ago
Agent-Based Online Quality Measurement Approach in Cloud Computing Environment
This paper studies online quality measurement in cloud computing environment. The paper analyzes concentration measure evaluation method of the current software quality evaluation...
Zhenyu Liu, Tiejiang Liu, Tun Lu, Lizhi Cai, Genxi...
HPCS
2005
IEEE
15 years 4 months ago
Comparison of Advanced Authorisation Infrastructures for Grid Computing
The widespread use of Grid technology and distributed compute power, with all its inherent benefits, will only be established if the use of that technology can be guaranteed effic...
A. J. Stell, Richard O. Sinnott, J. P. Watt
COMPUTER
2004
120views more  COMPUTER 2004»
14 years 10 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson