Sciweavers

1755 search results - page 175 / 351
» Design and Implementation of Virtual Organizations
Sort
View
IPPS
1998
IEEE
15 years 8 months ago
Migration and Rollback Transparency for Arbitrary Distributed Applications in Workstation Clusters
Programmers and users of compute intensive scientific applications often do not want to (or even cannot) code load balancing and fault tolerance into their programs. The PBEAM syst...
Stefan Petri, Matthias Bolz, Horst Langendörf...
RAID
2010
Springer
15 years 2 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
ENTCS
2006
140views more  ENTCS 2006»
15 years 4 months ago
A Web Service Architecture for Enforcing Access Control Policies
Web services represent a challenge and an opportunity for organizations wishing to expose product and services offerings through the Internet. The Web service technology provides ...
Claudio Agostino Ardagna, Ernesto Damiani, Sabrina...
ECUMN
2007
Springer
15 years 10 months ago
A Spatial Communication Model for Ubiquitous Computing Services
Abstract— The paper presents a location-aware communication approach in smart home environments. It is constructed on a symbolic location model to represent the containment relat...
Ichiro Satoh
WEA
2007
Springer
131views Algorithms» more  WEA 2007»
15 years 10 months ago
On the Cost of Persistence and Authentication in Skip Lists
We present an extensive experimental study of authenticated data structures for dictionaries and maps implemented with skip lists. We consider realizations of these data structures...
Michael T. Goodrich, Charalampos Papamanthou, Robe...