Sciweavers

422 search results - page 61 / 85
» Risk management for distributed authorization
Sort
View
125
Voted
SIGCPR
2000
ACM
173views Hardware» more  SIGCPR 2000»
15 years 5 months ago
Hollywood: a business model for the future?
This paper elucidates an emergent theory of organizational structure, process and leadership which the author believes will characterize the Internet based workplace of the future...
Charles E. Grantham
EDBT
2012
ACM
246views Database» more  EDBT 2012»
13 years 3 months ago
"Cut me some slack": latency-aware live migration for databases
Cloud-based data management platforms often employ multitenant databases, where service providers achieve economies of scale by consolidating multiple tenants on shared servers. I...
Sean Kenneth Barker, Yun Chi, Hyun Jin Moon, Hakan...
101
Voted
COMPSAC
2003
IEEE
15 years 6 months ago
PeAgent - A Mobile Agent System to Support Secure Internet and Web Applications
Many agent-based systems have been developed over the past decade; however, the security issues are usually not addressed adequately. In order to make the mobile agent paradigm mo...
Qingkai Ma, Wei Hao, Wei Li, Manghui Tu, I-Ling Ye...
IOR
2011
96views more  IOR 2011»
14 years 4 months ago
An Ascending Vickrey Auction for Selling Bases of a Matroid
Consider selling bundles of indivisible goods to buyers with concave utilities that are additively separable in money and goods. We propose an ascending auction for the case when ...
Sushil Bikhchandani, Sven de Vries, James Schummer...
SPAA
1997
ACM
15 years 4 months ago
Pipelining with Futures
Pipelining has been used in the design of many PRAM algorithms to reduce their asymptotic running time. Paul, Vishkin, and Wagener (PVW) used the approach in a parallel implementat...
Guy E. Blelloch, Margaret Reid-Miller