Sciweavers

232 search results - page 34 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
CEC
2010
IEEE
13 years 11 months ago
A Mean-Variance Optimization algorithm
A new stochastic optimization algorithm referred to by the authors as the `Mean-Variance Optimization' (MVO) algorithm is presented in this paper. MVO falls into the category ...
Istvan Erlich, Ganesh K. Venayagamoorthy, Nakawiro...
ADHOC
2006
95views more  ADHOC 2006»
13 years 10 months ago
LHAP: A lightweight network access control protocol for ad hoc networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the ...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
COMPUTING
2006
100views more  COMPUTING 2006»
13 years 9 months ago
Interval Arithmetic with Containment Sets
The idea of containment sets (csets) is due to Walster and Hansen, and the theory is mainly due to the first author. Now that floating point computation with infinities is widely a...
John D. Pryce, George F. Corliss
CONCURRENCY
2007
60views more  CONCURRENCY 2007»
13 years 9 months ago
Relative autonomous accounting for peer-to-peer Grids
We here present and evaluate relative accounting, an autonomous accounting scheme that provides accurate results even when the parties (consumer and provider) do not trust each ot...
Robson Santos, Alisson Andrade, Walfredo Cirne, Fr...
JWSR
2008
147views more  JWSR 2008»
13 years 9 months ago
Karma2: Provenance Management for Data-Driven Workflows
: The increasing ability for the sciences to sense the world around us is resulting in a growing need for data driven applications that are under the control of workflows composed ...
Yogesh L. Simmhan, Beth Plale, Dennis Gannon