Sciweavers

1748 search results - page 63 / 350
» Security Models for Heterogeneous Networking
Sort
View
EGC
2005
Springer
15 years 9 months ago
Mobile-to-Grid Middleware: Bridging the Gap Between Mobile and Grid Environments
Currently, access to Grid services is limited to resourceful devices such as desktop PCs but most mobile devices (with wireless network connections) cannot access the Grid network ...
Hassan Jameel, Umar Kalim, Ali Sajjad, Sungyoung L...
CN
2007
100views more  CN 2007»
15 years 3 months ago
Overlay architectures for file distribution: Fundamental performance analysis for homogeneous and heterogeneous cases
Peer-to-peer networks have been commonly used for tasks such as file sharing or file distribution. We study a class of cooperative file distribution systems where a file is br...
Ernst W. Biersack, Damiano Carra, Renato Lo Cigno,...
INFOCOM
2005
IEEE
15 years 9 months ago
A quantitative study of authentication and QoS in wireless IP networks
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
Wei Liang, Wenye Wang
ACSAC
1999
IEEE
15 years 7 months ago
Napoleon: A Recipe for Workflow
This paper argues that Napoleon, a flexible, role-based access control (RBAC) modeling environment, is also a practical solution for enforcing business process control, or workflo...
Charles N. Payne, D. J. Thomsen, J. Bogle, Richard...
IPPS
2008
IEEE
15 years 9 months ago
Decentralized market-based resource allocation in a heterogeneous computing system
We present a decentralized market-based approach to resource allocation in a heterogeneous overlay network. The presented resource allocation strategy assigns overlay network reso...
Jay Smith, Edwin K. P. Chong, Anthony A. Maciejews...