Sciweavers

62 search results - page 7 / 13
» A Scrutable User Modelling Infrastructure for Enabling Life-...
Sort
View
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
14 years 2 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick
FC
2007
Springer
122views Cryptology» more  FC 2007»
14 years 2 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp
CCGRID
2006
IEEE
14 years 2 months ago
Integrating the HLA RTI Services with Scilab
This paper describes the integration of the High Level Architecture (HLA), an IEEE standard for distributed interactive simulation, with a scientific software package (Scilab) and...
Thitima Theppaya, Pichaya Tandayya, Chatchai Janta...
GRID
2008
Springer
13 years 8 months ago
Statistical Analysis and Modeling of Jobs in a Grid Environment
The existence of good probabilistic models for the job arrival process and the delay components introduced at different stages of job processing in a Grid environment is important ...
Kostas Christodoulopoulos, Vasileios Gkamas, Emman...
EUROPAR
2009
Springer
14 years 3 months ago
Provider-Independent Use of the Cloud
Abstract. Utility computing offers researchers and businesses the potential of significant cost-savings in that it is possible for them to match the cost of their computing and s...
Terence J. Harmer, Peter Wright, Christina Cunning...