Sciweavers

131 search results - page 21 / 27
» Incorporating Trust in Network Virtualization
Sort
View
HPDC
2000
IEEE
15 years 2 months ago
Failure-Atomic File Access in an Interposed Network Storage System
This paper presents a recovery protocol for block I/O operations in Slice, a storage system architecture for highspeed LANs incorporating network-attached block storage. The goal ...
Darrell C. Anderson, Jeffrey S. Chase
GECCO
2007
Springer
181views Optimization» more  GECCO 2007»
15 years 3 months ago
A study on metamodeling techniques, ensembles, and multi-surrogates in evolutionary computation
Surrogate-Assisted Memetic Algorithm(SAMA) is a hybrid evolutionary algorithm, particularly a memetic algorithm that employs surrogate models in the optimization search. Since mos...
Dudy Lim, Yew-Soon Ong, Yaochu Jin, Bernhard Sendh...
HPDC
2003
IEEE
15 years 3 months ago
Security for Grid Services
Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations.” The dynamic and multi-institutional nature of ...
Von Welch, Frank Siebenlist, Ian T. Foster, John B...
CORR
2006
Springer
113views Education» more  CORR 2006»
14 years 9 months ago
Secure Positioning of Mobile Terminals with Simplex Radio Communication
With the rapid spread of various mobile terminals in our society, the importance of secure positioning is growing for wireless networks in adversarial settings. Recently, several ...
Mikio Fujii
WPES
2006
ACM
15 years 3 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov