Sciweavers

1132 search results - page 171 / 227
» Application of Grid Security to Personal Distributed Environ...
Sort
View
113
Voted
OTM
2005
Springer
15 years 9 months ago
JXTA Messaging: Analysis of Feature-Performance Tradeoffs and Implications for System Design
Abstract. With the rise of Peer-to-Peer and Grid infrastructures, there is a renewed interest in messaging systems. Among the numerous messaging solutions for large loosely coupled...
Emir Halepovic, Ralph Deters, Bernard Traversat
88
Voted
IC
2007
15 years 5 months ago
Resource Matching in a Peer-to-Peer Computational Framework
- The rise in high speed networks has led to an increased interest in the development of grid computing frameworks; the ubiquity of the broadband Internet connection has fostered w...
Daniel Santoni, Michael Katchabaw
129
Voted
WPES
2004
ACM
15 years 9 months ago
Privacy preserving route planning
The number of location-aware mobile devices has been rising for several years. As this trend continues, these devices may be able to use their location information to provide inte...
Keith B. Frikken, Mikhail J. Atallah
128
Voted
SACMAT
2009
ACM
15 years 10 months ago
Safety in discretionary access control for logic-based publish-subscribe systems
Publish-subscribe (pub-sub) systems are useful for many applications, including pervasive environments. In the latter context, however, great care must be taken to preserve the pr...
Kazuhiro Minami, Nikita Borisov, Carl A. Gunter
162
Voted
MOBISYS
2008
ACM
16 years 3 months ago
Flashproxy: transparently enabling rich web content via remote execution
It is now common for Web sites to use active Web content, such as Flash, Silverlight, or Java applets, to support rich, interactive applications. For many mobile devices, however,...
Alexander Moshchuk, Steven D. Gribble, Henry M. Le...