Sciweavers

352 search results - page 40 / 71
» Establishing norms with metanorms in distributed computation...
Sort
View
CSREASAM
2006
14 years 12 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
ICNP
1998
IEEE
15 years 2 months ago
QGMA: A New MAC Protocol for Supporting QoS in Wireless Local Area Networks
In this paper, we propose a novel MAC protocol, called Quality-ofservice Guarantee Multiple Access (QGMA), in wireless local area networks to support the quality of service requir...
Yi Ye, Chao-Ju Hou, Ching-Chih Han
BC
2008
73views more  BC 2008»
14 years 10 months ago
Interaction of ON and OFF pathways for visual contrast measurement
We propose a novel model of visual contrast measurement based on segregated ON and OFF pathways. Two driving forces have shaped our investigation: (1) establishing a mechanism sele...
Heiko Neumann, Luiz Pessoa, Thorsten Hansen
CCGRID
2003
IEEE
15 years 3 months ago
Improved Read Performance in a Cost-Effective, Fault-Tolerant Parallel Virtual File System (CEFT-PVFS)
Due to the ever-widening performance gap between processors and disks, I/O operations tend to become the major performance bottleneck of data-intensive applications on modern clus...
Yifeng Zhu, Hong Jiang, Xiao Qin, Dan Feng, David ...
JPDC
2008
122views more  JPDC 2008»
14 years 10 months ago
Stochastic robustness metric and its use for static resource allocations
This research investigates the problem of robust static resource allocation for distributed computing systems operating under imposed Quality of Service (QoS) constraints. Often, ...
Vladimir Shestak, Jay Smith, Anthony A. Maciejewsk...