Sciweavers

916 search results - page 166 / 184
» Performance Evaluation of Scheduling Policies for Volunteer ...
Sort
View
JCM
2008
75views more  JCM 2008»
14 years 11 months ago
A Secure Mobile Agents Platform
Abstract--Mobile Agents is a new paradigm for distributed computing where security is very essential to the acceptance of this paradigm in a large scale distributed environment. In...
Leila Ismail
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
13 years 2 months ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
ICDCS
2009
IEEE
15 years 9 months ago
ISP Friend or Foe? Making P2P Live Streaming ISP-Aware
Abstract: Current peer-to-peer systems are network-agnostic, often generating large volumes of unnecessary inter-ISP traffic. Although recent work has shown the benefits of ISP-a...
Fabio Picconi, Laurent Massoulié
HPCC
2007
Springer
15 years 5 months ago
CROWN FlowEngine: A GPEL-Based Grid Workflow Engine
Currently some complex grid applications developing often need orchestrate multiple diverse grid services into a workflow of tasks that can submit for executing on the grid environ...
Jin Zeng, Zongxia Du, Chunming Hu, Jinpeng Huai
HPDC
2002
IEEE
15 years 4 months ago
A Decentralized, Adaptive Replica Location Mechanism
We describe a decentralized, adaptive mechanism for replica location in wide-area distributed systems. Unlike traditional, hierarchical (e.g, DNS) and more recent (e.g., CAN, Chor...
Matei Ripeanu, Ian T. Foster