Sciweavers

4445 search results - page 751 / 889
» Reflective Authorization Systems
Sort
View
CONCURRENCY
2007
60views more  CONCURRENCY 2007»
14 years 10 months ago
Relative autonomous accounting for peer-to-peer Grids
We here present and evaluate relative accounting, an autonomous accounting scheme that provides accurate results even when the parties (consumer and provider) do not trust each ot...
Robson Santos, Alisson Andrade, Walfredo Cirne, Fr...
CORR
2007
Springer
85views Education» more  CORR 2007»
14 years 10 months ago
Interface groups and financial transfer architectures
Analytic execution architectures have been proposed by the same authors as a means to conceptualize the cooperation between heterogeneous collectives of components such as program...
Jan A. Bergstra, Alban Ponse
DM
2007
83views more  DM 2007»
14 years 10 months ago
Codes identifying sets of vertices in random networks
In this paper we deal with codes identifying sets of vertices in random networks; that is, (1, ≤ ℓ)-identifying codes. These codes enable us to detect sets of faulty processor...
Alan M. Frieze, Ryan Martin, Julien Moncel, Mikl&o...
92
Voted
JWSR
2008
147views more  JWSR 2008»
14 years 10 months ago
Karma2: Provenance Management for Data-Driven Workflows
: The increasing ability for the sciences to sense the world around us is resulting in a growing need for data driven applications that are under the control of workflows composed ...
Yogesh L. Simmhan, Beth Plale, Dennis Gannon
NETWORK
2008
106views more  NETWORK 2008»
14 years 10 months ago
Toward internet-wide multipath routing
The Internet would be more efficient and robust if routers could flexibly divide traffic over multiple paths. Often, having one or two extra paths is sufficient for customizing pa...
Jiayue He, Jennifer Rexford