Sciweavers

1144 search results - page 172 / 229
» Implementation of end-to-end abstractions in a network servi...
Sort
View
ESORICS
2002
Springer
15 years 10 months ago
TINMAN: A Resource Bound Security Checking System for Mobile Code
Resource security pertains to the prevention of unauthorized usage of system resources that may not directly cause corruption or leakage of information. A common breach of resource...
Aloysius K. Mok, Weijiang Yu
GRID
2007
Springer
14 years 11 months ago
Data Management in the APPA System
Combining Grid and P2P technologies can be exploited to provide high-level data sharing in large-scale distributed environments. However, this combination must deal with two hard p...
Reza Akbarinia, Vidal Martins
TGC
2007
Springer
15 years 5 months ago
Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems
Abstract. We propose and discuss foundations for programmable overlay networks and overlay computing systems. Such overlays are built over a large number of distributed computation...
Luigi Liquori, Michel Cosnard
84
Voted
EDO
2005
Springer
15 years 4 months ago
Generating connectors for heterogeneous deployment
re connector is an abstraction capturing interactions among components. Apart from middleware independence, connectors provide additional services (e.g., adaptation, synchronizati...
Ondrej Galik, Tomás Bures
CORR
2006
Springer
99views Education» more  CORR 2006»
14 years 11 months ago
Pathways: Augmenting interoperability across scholarly repositories
Abstract In the emerging eScience environment, repositories of papers, datasets, software, etc., should be the foundation of a global and natively-digital scholarly communications ...
Simeon Warner, Jeroen Bekaert, Carl Lagoze, Xiaomi...