Sciweavers

1748 search results - page 11 / 350
» Security Models for Heterogeneous Networking
Sort
View
165
Voted
HPDC
1995
IEEE
15 years 3 months ago
Loop Scheduling for Heterogeneity
In this paper, we study the problem of scheduling parallel loops at compile-time for a heterogeneous network of machines. We consider heterogeneity in three aspects of parallel pr...
Michal Cierniak, Wei Li, Mohammed Javeed Zaki
ESCIENCE
2006
IEEE
15 years 5 months ago
Communication over a Secured Heterogeneous Grid with the GriddLeS Runtime Environment
Scientific workflows are a powerful programming technique for specifying complex computations using a number of otherwise independent components. When used in a Grid environment, ...
Jagan Kommineni, David Abramson, Jefferson Tan
JMS
2010
139views more  JMS 2010»
14 years 10 months ago
Application of Portable CDA for Secure Clinical-document Exchange
Health Level Seven (HL7) organization published the Clinical Document Architecture (CDA) for exchanging documents among heterogeneous systems and improving medical quality based on...
Kuo-Hsuan Huang, Sung-huai Hsieh, Yuan-Jen Chang, ...
ACSAC
2005
IEEE
15 years 5 months ago
Looking Back at the Bell-La Padula Model
The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with its sibling engineering initiatives, it identifi...
David Elliott Bell
111
Voted
ICSOC
2009
Springer
14 years 9 months ago
A Genetic Algorithms-Based Approach for Optimized Self-protection in a Pervasive Service Middleware
With increasingly complex and heterogeneous systems in pervasive service computing, it becomes more and more important to provide self-protected services to end users. In order to ...
Weishan Zhang, Julian Schütte, Mads Ingstrup,...