Sciweavers

1923 search results - page 48 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
90
Voted
ICPPW
2009
IEEE
14 years 7 months ago
A Security-Aware Approach to JXTA-Overlay Primitives
The JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its desig...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...
CAISE
2010
Springer
14 years 10 months ago
Probabilistic Models to Reconcile Complex Data from Inaccurate Data Sources
There is a large amount of data that is published on the Web and several techniques have been developed to extract and integrate data from Web sources. However, Web data are inhere...
Lorenzo Blanco, Valter Crescenzi, Paolo Merialdo, ...
LADC
2007
Springer
15 years 3 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
FGCS
2007
160views more  FGCS 2007»
14 years 9 months ago
Distributed data mining in grid computing environments
The computing-intensive data mining for inherently Internet-wide distributed data, referred to as Distributed Data Mining (DDM), calls for the support of a powerful Grid with an e...
Ping Luo, Kevin Lü, Zhongzhi Shi, Qing He
ICDCS
1993
IEEE
15 years 1 months ago
Proxy-Based Authorization and Accounting for Distributed Systems
Despite recent widespread interest in the secure authentication of principals across computer networks there has been considerably less discussion of distributed mechanisms to sup...
B. Clifford Neuman