Sciweavers

322 search results - page 45 / 65
» A Socio-cognitive Approach to Modeling Policies in Open Envi...
Sort
View
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
HPDC
2003
IEEE
14 years 24 days ago
Security for Grid Services
Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations.” The dynamic and multi-institutional nature of ...
Von Welch, Frank Siebenlist, Ian T. Foster, John B...
ICWS
2007
IEEE
13 years 9 months ago
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions
Security enforcement framework is an important aspect of any distributed system. With new requirements imposed by SOA-based business models, adaptive security enforcement on the a...
Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitr...
JAIR
2006
101views more  JAIR 2006»
13 years 7 months ago
Resource Allocation Among Agents with MDP-Induced Preferences
Allocating scarce resources among agents to maximize global utility is, in general, computationally challenging. We focus on problems where resources enable agents to execute acti...
Dmitri A. Dolgov, Edmund H. Durfee
IJNM
2008
141views more  IJNM 2008»
13 years 7 months ago
Dynamic scheduling of network resources with advance reservations in optical grids
Advance reservation of lightpaths in Grid environments is necessary to guarantee QoS and reliability. In this paper, we have evaluated and compared several algorithms for dynamic ...
Savera Tanwir, Lina Battestilli, Harry G. Perros, ...