Sciweavers

136 search results - page 23 / 28
» Cross-organizational process monitoring based on service cho...
Sort
View
CCGRID
2003
IEEE
14 years 2 months ago
GridFlow: Workflow Management for Grid Computing
Grid computing is becoming a mainstream technology for large-scale distributed resource sharing and system integration. Workflow management is emerging as one of the most importan...
Junwei Cao, Stephen A. Jarvis, Subhash Saini, Grah...
HICSS
2003
IEEE
122views Biometrics» more  HICSS 2003»
14 years 2 months ago
A Three-Layer Architecture for E-Contract Enforcement in an E-Service Environment
In an e-service environment, contracts are important for attaining business process interoperability and enforcing their proper enactment. An e-contract is the computerized facili...
Dickson K. W. Chiu, Shing-Chi Cheung, Sven Till
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
14 years 14 days ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
AAAI
1998
13 years 10 months ago
An Expert System for Alarm System Planning
This paper discusses the design and implementation of ESSPL, an expert system which generates security plans for alarm systems (Figure 1). Security planning is the task of determi...
Akira Tsurushima, Kenji Urushima, Daigo Sakata, Hi...
TPDS
2008
75views more  TPDS 2008»
13 years 8 months ago
Performance-Guided Load (Un)balancing under Autocorrelated Flows
Size-based policies have been shown in the literature to effectively balance load and improve performance in cluster environments. Size-based policies assign jobs to servers based...
Qi Zhang, Ningfang Mi, Alma Riska, Evgenia Smirni