Sciweavers

1286 search results - page 190 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
IJNSEC
2007
157views more  IJNSEC 2007»
13 years 7 months ago
Balancing Trust and Incentive in Peer-to-Peer Collaborative System
In order to maximize resource utilization as well as providing trust management in P2P computing environments, we propose a novel framework - Trust-Incentive Service Management (T...
Yu Zhang, Li Lin, Jinpeng Huai
ICCSA
2005
Springer
14 years 1 months ago
Resource and Service Discovery in the iGrid Information Service
In this paper we describe resource and service discovery mechanisms available in iGrid, a novel Grid Information Service based on the relational model. iGrid is developed within th...
Giovanni Aloisio, Massimo Cafaro, Italo Epicoco, S...
COMGEO
2006
ACM
13 years 7 months ago
Cost prediction for ray shooting in octrees
The ray shooting problem arises in many different contexts and is a bottleneck of ray tracing in computer graphics. Unfortunately, theoretical solutions to the problem are not ver...
Boris Aronov, Hervé Brönnimann, Allen ...
SIGOPSE
1998
ACM
13 years 12 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
ICDCS
1991
IEEE
13 years 11 months ago
Supporting the development of network programs
of ‘‘network computers’’ is inherently lessAbstract predictable than that of more traditional distributed memory systems, such as hypercubes [22], since both theFor computa...
Bernd Bruegge, Peter Steenkiste