Sciweavers

1630 search results - page 173 / 326
» Secure Overlay Network Design
Sort
View
CONCURRENCY
2006
169views more  CONCURRENCY 2006»
14 years 10 months ago
A component-based middleware framework for configurable and reconfigurable Grid computing
Significant progress has been made in the design and development of Grid middleware which, in its present form, is founded on service-oriented architecture and web services techno...
Geoff Coulson, Paul Grace, Gordon S. Blair, Wei Ca...
TRIDENTCOM
2010
IEEE
14 years 8 months ago
TopHat: Supporting Experiments through Measurement Infrastructure Federation
Researchers use the PlanetLab testbed for its ability to host experimental applications in realistic conditions over the public besteffort internet. Such applications form overlays...
Thomas Bourgeau, Jordan Augé, Timur Friedma...
86
Voted
GLOBECOM
2009
IEEE
14 years 8 months ago
Time-Critical Data Dissemination in Cooperative Peer-to-Peer Systems
How to rapidly disseminate a large-sized file to many recipients is a fundamental problem in many applications, such as updating software patches and distributing large scientific ...
Chi-Jen Wu, Cheng-Ying Li, Kai-Hsiang Yang, Jan-Mi...
ACC
2011
164views more  ACC 2011»
13 years 10 months ago
IMS and Presence Service Integration on Intelligent Transportation Systems for Future Services
Once some stable solutions appear to be found at physical and network layers for cooperative Intelligent Transportation Systems (ITS), deploying vehicular services and managing the...
Andrés Garcia, José Santa, Antonio M...
83
Voted
SACMAT
2009
ACM
15 years 4 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode