Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
: The music industry is an interesting example for how business models from the pre-Internet area can get into trouble in the new Internet-based economy. Since 2000, the music indu...
Current systems for managing workload on clusters of workstations, particularly those available for Linux-based (Beowulf) clusters, are typically based on traditional process-base...
Daniel Andresen, Nathan Schopf, Ethan Bowker, Timo...
This paper presents our work on an experimental system for visualization of the light load. The light load is thought as the total amount of light radiation received by all areas ...
As high-speed networks make it easier to use distributed resources, it becomes increasingly common that applications and their data are not colocated. Users have traditionally add...
Ian T. Foster, David Kohr, Rakesh Krishnaiyer, Jac...