Sciweavers

3474 search results - page 635 / 695
» Data Management in RFID Applications
Sort
View
IPPS
2006
IEEE
15 years 10 months ago
Trust overlay networks for global reputation aggregation in P2P grid computing
1 This paper presents a new approach to trusted Grid computing in a Peer-to-Peer (P2P) setting. Trust and security are essential to establish lasting working relationships among th...
Runfang Zhou, Kai Hwang
RTCSA
2006
IEEE
15 years 10 months ago
Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems
Real-time embedded systems are increasingly being networked. In distributed real-time embedded applications, e.g., electric grid management and command and control applications, i...
Kyoung-Don Kang, Sang Hyuk Son
PPOPP
2006
ACM
15 years 10 months ago
McRT-STM: a high performance software transactional memory system for a multi-core runtime
Applications need to become more concurrent to take advantage of the increased computational power provided by chip level multiprocessing. Programmers have traditionally managed t...
Bratin Saha, Ali-Reza Adl-Tabatabai, Richard L. Hu...
MATES
2005
Springer
15 years 9 months ago
Collaborative Agent-Based Knowledge Support for Empirical and Knowledge-Intense Processes
Independent from specific application domains, similar requirements can be identified regarding information needs during daily work. For coping with generality on the one hand an...
Andrea Freßmann, Kerstin Maximini, Rainer Ma...
SPAA
2010
ACM
15 years 9 months ago
Implementing and evaluating nested parallel transactions in software transactional memory
Transactional Memory (TM) is a promising technique that simplifies parallel programming for shared-memory applications. To date, most TM systems have been designed to efficientl...
Woongki Baek, Nathan Grasso Bronson, Christos Kozy...