Sciweavers

5269 search results - page 97 / 1054
» Operating system resource management
Sort
View
ICNS
2007
IEEE
15 years 4 months ago
Towards System-level Optimization for High Performance Unified Threat Management
To build holistic protection against complex and blended network threats, multiple security features need to be integrated into a unified security architecture, which requires in ...
Yaxuan Qi, Baohua Yang, Bo Xu, Jun Li
IJAMC
2008
85views more  IJAMC 2008»
14 years 10 months ago
Scalable reputation management with trustworthy user selection for P2P MMOGs
: Recent research on Peer-to-Peer Massively Multiplayer Online Games (P2P MMOGs) has tried to find more scalable and affordable solutions to build virtual environments via the reso...
Guan-Yu Huang, Shun-Yun Hu, Jehn-Ruey Jiang
SOUPS
2006
ACM
15 years 3 months ago
Intentional access management: making access control usable for end-users
The usability of access control mechanisms in modern distributed systems has been widely criticized but little studied. In this paper, we carefully examine one such widely deploye...
Xiang Cao, Lee Iverson
ESCIENCE
2006
IEEE
15 years 4 months ago
Managing Large-Scale Workflow Execution from Resource Provisioning to Provenance Tracking: The CyberShake Example
This paper discusses the process of building an environment where large-scale, complex, scientific analysis can be scheduled onto a heterogeneous collection of computational and s...
Ewa Deelman, Scott Callaghan, Edward Field, Hunter...
ISPE
2003
14 years 11 months ago
Coordination in utility managed multi-agent groups
A two stage approach to co-ordination in a multi-agent society is presented. The first stage involves agents learning to co-ordinate their activities based on local and global uti...
Fernanda Barbosa, José C. Cunha, Omer F. Ra...