Sciweavers

443 search results - page 55 / 89
» Compensation-Aware Runtime Monitoring
Sort
View
ICIW
2007
IEEE
14 years 5 months ago
Towards a Framework for Dynamic Verification of Peer-to-Peer Systems
Ensuring dependability and security of Peer-toPeer (P2P) systems is an intricate task due to the autonomous and volatile nature of peers and the decentralization that characterize...
Theofrastos Koulouris, George Spanoudakis, Theocha...
IPPS
2006
IEEE
14 years 5 months ago
Online strategies for high-performance power-aware thread execution on emerging multiprocessors
Granularity control is an effective means for trading power consumption with performance on dense shared memory multiprocessors, such as multi-SMT and multi-CMP systems. In this p...
Matthew Curtis-Maury, James Dzierwa, Christos D. A...
ICAC
2005
IEEE
14 years 4 months ago
The J3 Process for Building Autonomic Enterprise Java Bean Systems
Autonomic computer systems aim to reduce the configuration, operational, and maintenance costs of distributed enterprise applications. This paper provides two contributions to the...
Jules White, Douglas C. Schmidt, Aniruddha S. Gokh...
SC
2005
ACM
14 years 4 months ago
Balanced Multicasting: High-throughput Communication for Grid Applications
Many grid applications need to transfer large amounts of data between the geographically distributed sites of a grid environment. Network heterogeneity between these sites makes t...
Mathijs den Burger, Thilo Kielmann, Henri E. Bal
ICTCS
2005
Springer
14 years 4 months ago
Checking Risky Events Is Enough for Local Policies
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...