Sciweavers

357 search results - page 37 / 72
» Performance Comparison of Security Mechanisms for Grid Servi...
Sort
View
ICDE
2009
IEEE
122views Database» more  ICDE 2009»
16 years 3 months ago
Secure Enterprise Services Consumption for SaaS Technology Platforms
Over recent years there has been increased level of discussion on utility pricing for software. The focus of these discussions is to create new operating cost models where the unit...
Yücel Karabulut, Ike Nassi
SUTC
2006
IEEE
15 years 7 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
GRID
2004
Springer
15 years 7 months ago
From Sandbox to Playground: Dynamic Virtual Environments in the Grid
Much experience has been gained with the protocols and mechanisms needed for discovery and allocation of remote computational resources. However, the preparation of a remote compu...
Katarzyna Keahey, Karl Doering, Ian T. Foster
ICDCSW
2009
IEEE
15 years 8 months ago
Performance Tradeoffs Among Percolation-Based Broadcast Protocols in Wireless Sensor Networks
Broadcast of information in wireless sensor networks is an important operation, e.g., for code updates, queries, membership information, etc. In this paper, we analyze and experim...
Vijay Raman, Indranil Gupta
FGCS
2007
146views more  FGCS 2007»
15 years 1 months ago
Distributed medical images analysis on a Grid infrastructure
In this paper medical applications on a Grid infrastructure, the MAGIC-5 Project, are presented and discussed. MAGIC-5 aims at developing Computer Aided Detection (CADe) software ...
Roberto Bellotti, Piergiorgio Cerello, S. Tangaro,...