Sciweavers

831 search results - page 141 / 167
» Design and Implementation of a Distributed Workflow Enactmen...
Sort
View
CONCURRENCY
2008
104views more  CONCURRENCY 2008»
13 years 7 months ago
PERMIS: a modular authorization infrastructure
Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...
CORR
2010
Springer
167views Education» more  CORR 2010»
13 years 7 months ago
Development of a Context Aware Virtual Smart Home Simulator
Context awareness is the most important research area in ubiquitous computing. In particular, for smart home, context awareness attempts to bring the best services to the home hab...
Tam Van Nguyen, Huy Anh Nguyen, Deokjai Choi
IPPS
2007
IEEE
14 years 2 months ago
Improving Secure Communication Policy Agreements by Building Coalitions
In collaborative applications, participants agree on certain level of secure communication based on communication policy speciļ¬cations. Given secure communication policy speciļ¬...
Srilaxmi Malladi, Sushil K. Prasad, Shamkant B. Na...
IPPS
2006
IEEE
14 years 1 months ago
Recent advances in checkpoint/recovery systems
Checkpoint and Recovery (CPR) systems have many uses in high-performance computing. Because of this, many developers have implemented it, by hand, into their applications. One of ...
Greg Bronevetsky, Rohit Fernandes, Daniel Marques,...
WOSP
2005
ACM
14 years 1 months ago
Applying SPE techniques for modeling a grid-enabled JAVA platform
Advances in Internet and the availability of powerful computers and high-speed networks have propitiated the rise of Grids. The scheduling of applications is complex in Grids due ...
Mariela Curiel, M. Angélica Pérez, R...