Sciweavers

1286 search results - page 214 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
SACMAT
2011
ACM
12 years 10 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
ICCS
2009
Springer
13 years 5 months ago
Developing Scientific Applications with Loosely-Coupled Sub-tasks
The Simple API for Grid Applications (SAGA) can be used to develop a range of applications which are in turn composed of multiple sub-tasks. In particular SAGA is an effective tool...
Shantenu Jha, Yaakoub El Khamra, Joohyun Kim
ICCV
2009
IEEE
13 years 5 months ago
Jointly estimating demographics and height with a calibrated camera
One important problem in computer vision is to provide a demographic description a person from an image. In practice, many of the state-of-the-art methods use only an analysis of ...
Andrew C. Gallagher, Andrew C. Blose, Tsuhan Chen
IPPS
2010
IEEE
13 years 5 months ago
On the importance of bandwidth control mechanisms for scheduling on large scale heterogeneous platforms
We study three scheduling problems (file redistribution, independent tasks scheduling and broadcasting) on large scale heterogeneous platforms under the Bounded Multi-port Model. I...
Olivier Beaumont, Hejer Rejeb
ICDCS
2006
IEEE
14 years 1 months ago
On the Access Pricing Issues of Wireless Mesh Networks
This paper studies the use of pricing as an incentive mechanism to encourage private, self-interested nodes to participate in a public wireless mesh network and cooperate in the p...
Ray K. Lam, John C. S. Lui, Dah-Ming Chiu