Sciweavers

8772 search results - page 1705 / 1755
» Business Services Networks
Sort
View
NDSS
2006
IEEE
14 years 3 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
CASES
2006
ACM
14 years 3 months ago
Methods for power optimization in distributed embedded systems with real-time requirements
Dynamic voltage scaling and sleep state control have been shown to be extremely effective in reducing energy consumption in CMOS circuits. Though plenty of research papers have st...
Razvan Racu, Arne Hamann, Rolf Ernst, Bren Mochock...
SIGMETRICS
2006
ACM
174views Hardware» more  SIGMETRICS 2006»
14 years 3 months ago
Understanding the management of client perceived response time
Understanding and managing the response time of web services is of key importance as dependence on the World Wide Web continues to grow. We present Remote Latency-based Management...
David P. Olshefski, Jason Nieh
HPDC
2005
IEEE
14 years 2 months ago
Design and implementation tradeoffs for wide-area resource discovery
This paper describes the design and implementation of SWORD, a scalable resource discovery service for widearea distributed systems. In contrast to previous systems, SWORD allows ...
David L. Oppenheimer, Jeannie R. Albrecht, David A...
ISCC
2005
IEEE
101views Communications» more  ISCC 2005»
14 years 2 months ago
Comparing and Evaluating Lightweight Solutions for Replica Dissemination and Retrieval in Dense MANETs
There is an emerging market interest in service provisioning over dense Mobile Ad-hoc NETworks (MANETs), i.e., limited spatial regions, such as shopping malls, airports, and unive...
Paolo Bellavista, Antonio Corradi, Eugenio Magistr...
« Prev « First page 1705 / 1755 Last » Next »