Sciweavers

340 search results - page 35 / 68
» A Simple User Authentication Scheme for Grid Computing
Sort
View
PDCAT
2005
Springer
14 years 1 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
ICDCS
1997
IEEE
13 years 12 months ago
Two New Quorum Based Algorithms for Distributed Mutual Exclusion
Two novel suboptimal algorithms for mutual exclusion in distributed systems are presented. One is based on the modi cation of Maekawa's grid based quorum scheme. The size of ...
Wai-Shing Luk, Tien-Tsin Wong
GRID
2008
Springer
13 years 7 months ago
Statistical Analysis and Modeling of Jobs in a Grid Environment
The existence of good probabilistic models for the job arrival process and the delay components introduced at different stages of job processing in a Grid environment is important ...
Kostas Christodoulopoulos, Vasileios Gkamas, Emman...
JSSPP
2007
Springer
14 years 1 months ago
Prospects of Collaboration between Compute Providers by Means of Job Interchange
Abstract. This paper empirically explores the advantages of the collaboration between different parallel compute sites in a decentralized grid scenario. To this end, we assume ind...
Christian Grimme, Joachim Lepping, Alexander Papas...
CN
2007
99views more  CN 2007»
13 years 7 months ago
Design and implementation of a secure wide-area object middleware
Wide-area service replication is becoming increasingly common, with the emergence of new operational models such as content delivery networks and computational grids. This paper d...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...