Sciweavers

6844 search results - page 1238 / 1369
» Web Service Security
Sort
View
IPOM
2005
Springer
15 years 3 months ago
Discovering Topologies at Router Level
—Measurement and monitoring of network topologies are essential tasks in current network scenarios. Indeed, due to their utility in planning, management, security, and reliabilit...
Donato Emma, Antonio Pescapè, Giorgio Ventr...
NOSSDAV
2005
Springer
15 years 3 months ago
Peer-to-peer internet telephony using SIP
P2P systems inherently have high scalability, robustness and fault tolerance because there is no centralized server and the network self-organizes itself. This is achieved at the ...
Kundan Singh, Henning Schulzrinne
VLDB
2005
ACM
151views Database» more  VLDB 2005»
15 years 3 months ago
Query Execution Assurance for Outsourced Databases
In this paper we propose and analyze a method for proofs of actual query execution in an outsourced database framework, in which a client outsources its data management needs to a...
Radu Sion
GRID
2004
Springer
15 years 3 months ago
From Sandbox to Playground: Dynamic Virtual Environments in the Grid
Much experience has been gained with the protocols and mechanisms needed for discovery and allocation of remote computational resources. However, the preparation of a remote compu...
Katarzyna Keahey, Karl Doering, Ian T. Foster
GRID
2004
Springer
15 years 3 months ago
Distributed Ant: A System to Support Application Deployment in the Grid
e-Science has much to benefit from the emerging field of grid computing. However, construction of e-Science grids is a complex and inefficient undertaking. In particular, deployme...
Wojtek Goscinski, David Abramson
« Prev « First page 1238 / 1369 Last » Next »