Sciweavers

1383 search results - page 241 / 277
» Computational Mechanisms for Distributed Requirements Engine...
Sort
View
NCA
2003
IEEE
14 years 1 months ago
Web Proxy Cache Replacement: Do's, Don'ts, and Expectations
Numerous research efforts have produced a large number of algorithms and mechanisms for web proxy caches. In order to build powerful web proxies and understand their performance, ...
Peter Triantafillou, Ioannis Aekaterinidis
AINA
2009
IEEE
14 years 1 months ago
Services to the Field: An Approach for Resource Constrained Sensor/Actor Networks
Nowadays more and more devices of daily life are connected to each other and are integrated into massively distributed networks of embedded devices. These devices range from consu...
Christian Buckl, Stephan Sommer, Andreas Scholz, A...
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
13 years 10 months ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi
COMSUR
2008
169views more  COMSUR 2008»
13 years 8 months ago
Peer-to-peer-based resource discovery In global grids: A tutorial
Efficient Resource discovery mechanism is one of the fundamental requirement for Grid computing systems, as it aids in resource management and scheduling of applications. Resource...
Rajiv Ranjan, Aaron Harwood, Rajkumar Buyya
SOSP
2003
ACM
14 years 5 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...