Sciweavers

352 search results - page 20 / 71
» Establishing norms with metanorms in distributed computation...
Sort
View
ICPADS
2005
IEEE
15 years 4 months ago
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access
In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Yusuf Uzunay, Kemal Bicakci
GRID
2004
Springer
15 years 3 months ago
An Enabling Environment for Distributed Simulation and Visualization
In this paper we present the MASSIVE project that aims to use Grid technology to establish an enabling environment for distributed simulation and visualization of large-scale scie...
Yao Zheng, Guanghua Song, Jifa Zhang, Jianjun Chen...
IPPS
2008
IEEE
15 years 4 months ago
Divisible Load Scheduling with Result Collection on Heterogeneous Systems
Divisible Load Theory (DLT) is an established mathematical framework to study Divisible Load Scheduling (DLS). However, traditional DLT does not comprehensively deal with the sche...
Abhay Ghatpande, Hidenori Nakazato, Hiroshi Watana...
COORDINATION
2004
Springer
15 years 3 months ago
Enforcement of Communal Policies for P2P Systems
Abstract. We consider the question of how to establish and enforce communal policies for peer-to-peer (P2P) communities. Generally, members of each P2P community must conform to an...
Mihail F. Ionescu, Naftaly H. Minsky, Thu D. Nguye...
DAIS
2011
14 years 2 months ago
Gozar: NAT-Friendly Peer Sampling with One-Hop Distributed NAT Traversal
Gossip-based peer sampling protocols have been widely used as a building block for many large-scale distributed applications. However, Network Address Translation gateways (NATs) c...
Amir H. Payberah, Jim Dowling, Seif Haridi