Sciweavers

45 search results - page 8 / 9
» Scheduling and control decision-making under an integrated i...
Sort
View
80
Voted
ACSAC
2000
IEEE
15 years 1 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
86
Voted
COOPIS
2004
IEEE
15 years 1 months ago
A Mobile Agent Infrastructure for QoS Negotiation of Adaptive Distributed Applications
Abstract. QoS-aware distributed applications such as certain Multimedia and Ubiquitous Computing applications can benefit greatly from the provision of QoS guarantees from the unde...
Roberto Speicys Cardoso, Fabio Kon
121
Voted
PPOPP
2011
ACM
14 years 10 days ago
GRace: a low-overhead mechanism for detecting data races in GPU programs
In recent years, GPUs have emerged as an extremely cost-effective means for achieving high performance. Many application developers, including those with no prior parallel program...
Mai Zheng, Vignesh T. Ravi, Feng Qin, Gagan Agrawa...
BMCBI
2007
108views more  BMCBI 2007»
14 years 9 months ago
Design and implementation of a generalized laboratory data model
Background: Investigators in the biological sciences continue to exploit laboratory automation methods and have dramatically increased the rates at which they can generate data. I...
Michael C. Wendl, Scott Smith, Craig S. Pohl, Davi...
CCS
2007
ACM
15 years 3 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder