Sciweavers

738 search results - page 26 / 148
» Comparison of Approaches to Service Deployment
Sort
View
ASC
2004
13 years 9 months ago
Evaluation of services using a fuzzy analytic hierarchy process
This paper proposes a new approach for tackling the uncertainty and imprecision of the service evaluation process. Identifying suitable service offers, evaluating the offers and c...
Ludmil Mikhailov, Petco E. Tsvetinov
HPDC
2007
IEEE
14 years 4 months ago
A provisioning model and its comparison with best-effort for performance-cost optimization in grids
The resource availability in Grids is generally unpredictable due to the autonomous and shared nature of the Grid resources and stochastic nature of the workload resulting in a be...
Gurmeet Singh, Carl Kesselman, Ewa Deelman
WINET
2010
179views more  WINET 2010»
13 years 8 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 9 months ago
Active Architecture for Pervasive Contextual Services
Pervasive services may be defined as services that are available to any client (anytime, anywhere). Here we focus on the software and network infrastructure required to support pe...
Graham N. C. Kirby, Alan Dearle, Ronald Morrison, ...
ADC
2006
Springer
169views Database» more  ADC 2006»
14 years 3 months ago
A further study in the data partitioning approach for frequent itemsets mining
Frequent itemsets mining is well explored for various data types, and its computational complexity is well understood. Based on our previous work by Nguyen and Orlowska (2005), th...
Son N. Nguyen, Maria E. Orlowska