Sciweavers

948 search results - page 114 / 190
» Making a Game of Network Security
Sort
View
IVEVA
2004
14 years 11 months ago
Giving Embodied Agents a Grid-Boost
Grid technology has been widely used for large-scale computational problems, but it also provides a framework for running a big number of smallsized processes. Moreover, these proc...
José A. Pérez, Carlos Delgado-Mata, ...
DOA
2000
159views more  DOA 2000»
14 years 11 months ago
Mobile Code as an Enabling Technology for Service-Oriented Smartcard Middleware
Smartcards can be seen as service providing entities that implement a secure, tamper-proof storage and offer computational resources which make them ideally suited for a variety o...
Roger Kehr, Michael Rohs, Harald Vogt
FGCS
2002
89views more  FGCS 2002»
14 years 9 months ago
The Legion support for advanced parameter-space studies on a grid
Parameter-space studies involve running a single application several times with different parameter sets. Since the jobs are mutually independent, many computing resources can be r...
Anand Natrajan, Marty A. Humphrey, Andrew S. Grims...
ICC
2008
IEEE
138views Communications» more  ICC 2008»
15 years 4 months ago
Localization of IP Links Faults Using Overlay Measurements
—Accurate fault detection and localization is essential to the efficient and economical operation of ISP networks. In addition, it affects the performance of Internet applicatio...
Mohammad Fraiwan, Manimaran Manimaran
COMSNETS
2012
222views more  COMSNETS 2012»
13 years 5 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...