Sciweavers

395 search results - page 70 / 79
» Priority Scheduling of Distributed Systems Based on Model Ch...
Sort
View
CSREASAM
2006
14 years 10 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
ICDT
2012
ACM
242views Database» more  ICDT 2012»
12 years 11 months ago
Win-move is coordination-free (sometimes)
In a recent paper by Hellerstein [15], a tight relationship was conjectured between the number of strata of a Datalog¬ program and the number of “coordination stages” require...
Daniel Zinn, Todd J. Green, Bertram Ludäscher
64
Voted
WEBNET
2001
14 years 10 months ago
Designing a Collaboration Environment for Teleworkers
: Teleworking enables a more flexible scheduling of working time and places of work on the way to the modern information society. The rapid development of cooperative application s...
Iris Braun, Ulf Zschuckelt
CCGRID
2007
IEEE
15 years 3 months ago
Performance Evaluation in Grid Computing: A Modeling and Prediction Perspective
Experimental performance studies on computer systems, including Grids, require deep understandings on their workload characteristics. The need arises from two important and closel...
Hui Li
MIDDLEWARE
2004
Springer
15 years 2 months ago
Architecture for resource allocation services supporting interactive remote desktop sessions in utility grids
Emerging large scale utility computing systems like Grids promise computing and storage to be provided to end users as a utility. System management services deployed in the middle...
Vanish Talwar, Bikash Agarwalla, Sujoy Basu, Raj K...