Sciweavers

704 search results - page 78 / 141
» Asynchronous resource discovery
Sort
View
SAC
2002
ACM
13 years 7 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
HPDC
2002
IEEE
14 years 25 days ago
Decoupling Computation and Data Scheduling in Distributed Data-Intensive Applications
In high energy physics, bioinformatics, and other disciplines, we encounter applications involving numerous, loosely coupled jobs that both access and generate large data sets. So...
Kavitha Ranganathan, Ian T. Foster
AAMAS
2004
Springer
13 years 7 months ago
Functional Validation in Grid Computing
The development of the World Wide Web has changed the way we think about information. Information on the web is distributed, updates are made asynchronously and resources come onli...
Guofei Jiang, George Cybenko
SRDS
2008
IEEE
14 years 2 months ago
Application-Level Recovery Mechanisms for Context-Aware Pervasive Computing
We identify here various kinds of failure conditions and robustness issues that arise in context-aware pervasive computing applications. Such conditions are related to failures in...
Devdatta Kulkarni, Anand Tripathi
HICSS
2007
IEEE
136views Biometrics» more  HICSS 2007»
14 years 2 months ago
Exploring the Adoption, Utility, and Social Influences of Social Bookmarking in a Corporate Environment
This paper describes an ongoing technology investigation to assess the value and utility of social bookmarking on a corporate intranet. We hypothesize that social bookmarking woul...
Laurie E. Damianos, Donna L. Cuomo, John Griffith,...