Sciweavers

1923 search results - page 292 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
ICDCS
2005
IEEE
15 years 3 months ago
Enhancing Source-Location Privacy in Sensor Network Routing
— One of the most notable challenges threatening the successful deployment of sensor systems is privacy. Although many privacy-related issues can be addressed by security mechani...
Pandurang Kamat, Yanyong Zhang, Wade Trappe, Celal...
COOPIS
1998
IEEE
15 years 2 months ago
A Generative Communication Service for Database Interoperability
Parallel and distributed programming is conceptually harder to undertake and to understand than sequential programming, because a programmer often has to manage the coexistence an...
Wilhelm Hasselbring, Mark Roantree
SKG
2006
IEEE
15 years 3 months ago
Dynamic Setting, Verification and Adjustment of Upper Bound Constraints in Grid Workflow Systems
Upper bound constraints are often set when complex scientific or business processes are modelled as grid workflow specifications. However, many existing processes such as climate ...
Jinjun Chen, Yun Yang
CW
2002
IEEE
15 years 2 months ago
Function-Based 3D Web Visualization
This paper describes how the web-based visualization can be greatly improved using the function-based shape modeling technique. The improvement is possible because the proposed fu...
Lai Feng Min, Alexei Sourin, Konstantin Levinski
PRDC
2000
IEEE
15 years 2 months ago
Enforcing synchronous system properties on top of timed systems
A synchronous system model is a simple yet powerful distributed system model that reduces the complexity of the design and implementation of dependable distributed applications. H...
Christof Fetzer