Sciweavers

955 search results - page 84 / 191
» An Evaluation of Current High-Performance Networks
Sort
View
CCGRID
2006
IEEE
15 years 10 months ago
Simple Locality-Aware Co-allocation in Peer-to-Peer Supercomputing
With current grid middleware, it is difficult to deploy distributed supercomputing applications that run concurrently on multiple resources. As current grid middleware systems ha...
Niels Drost, Rob van Nieuwpoort, Henri E. Bal
ISI
2006
Springer
15 years 4 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
TSP
2010
14 years 11 months ago
Statistical detection of congestion in routers
Detection of congestion plays a key role in numerous networking protocols, including those driving Active Queue Management (AQM) methods used in congestion control in Internet rout...
Ivan D. Barrera, Stephan Bohacek, Gonzalo R. Arce
DSN
2009
IEEE
15 years 11 months ago
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
Remote attestation of system integrity is an essential part of trusted computing. However, current remote attestation techniques only provide integrity proofs of static properties...
Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Pen...
PERCOM
2010
ACM
15 years 2 months ago
Towards the adaptive integration of multiple context reasoners in pervasive computing environments
Abstract—The pervasive computing vision consists in realizing ubiquitous technologies to support the execution of people’s everyday tasks by proactively providing appropriate i...
Daniele Riboni, Linda Pareschi, Claudio Bettini