Sciweavers

674 search results - page 46 / 135
» Resource Bound Certification
Sort
View
NDSS
2003
IEEE
15 years 5 months ago
Moderately Hard, Memory-Bound Functions
A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending an e-mail has negligible cost for the sender. It has been sugge...
Martín Abadi, Michael Burrows, Ted Wobber
BPM
2008
Springer
134views Business» more  BPM 2008»
15 years 1 months ago
Digital Identity and Reputation in the Context of a Bounded Social Ecosystem
This paper highlights the problem of digital identity, or cross-set unique identifying tokens, inherent in the application of social software in business processes. As social softw...
Ben Jennings, Anthony Finkelstein
FGCN
2007
IEEE
126views Communications» more  FGCN 2007»
15 years 6 months ago
Traffic Splitting with Network Calculus for Mesh Sensor Networks
In many applications of sensor networks, it is essential to ensure that messages are transmitted to their destinations as early as possible and the buffer size of each sensor node...
Huimin She, Zhonghai Lu, Axel Jantsch, Li-Rong Zhe...
CCGRID
2005
IEEE
15 years 5 months ago
Efficient resource description and high quality selection for virtual grids
Simple resource specification, resource selection, and effective binding are critical capabilities for Grid middleware. We the Virtual Grid, an abstraction for dynamic grid applic...
Yang-Suk Kee, D. Logothetis, Richard Y. Huang, Hen...
CN
2004
130views more  CN 2004»
14 years 11 months ago
The effect of bandwidth and buffer pricing on resource allocation and QoS
Congestion-based pricing of network resources is a common approach in evolving network architectures that support Quality of Service (QoS). Resource usage and QoS will thus fluctu...
Nan Jin, Scott Jordan