Sciweavers

5348 search results - page 968 / 1070
» Time-critical information services
Sort
View
SIGOPS
2008
183views more  SIGOPS 2008»
15 years 1 months ago
Plan 9 authentication in Linux
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Ashwin Ganti
IJHPCA
2007
116views more  IJHPCA 2007»
15 years 1 months ago
Pricing for Utility-Driven Resource Management and Allocation in Clusters
Users perceive varying levels of utility for each different job completed by the cluster. Therefore, there is a need for existing cluster Resource Management Systems (RMS) to prov...
Chee Shin Yeo, Rajkumar Buyya
TPDS
2008
231views more  TPDS 2008»
15 years 1 months ago
Anonymous Geo-Forwarding in MANETs through Location Cloaking
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and I...
Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino
JPDC
2007
100views more  JPDC 2007»
15 years 1 months ago
Deadlock-free connection-based adaptive routing with dynamic virtual circuits
Virtual circuits can reduce routing overheads with irregular topologies and provide support for a mix of quality of service (QOS) requirements. Information about network loads and...
Yoshio Turner, Yuval Tamir
JUCS
2007
112views more  JUCS 2007»
15 years 1 months ago
Internet Path Behavior Prediction via Data Mining: Conceptual Framework and Case Study
: In this paper we propose an application of data mining methods in the prediction of the availability and performance of Internet paths. We deploy a general decision-making method...
Leszek Borzemski