Sciweavers

823 search results - page 91 / 165
» Distributed Cipher Services Using Object Activation
Sort
View
ISORC
2005
IEEE
14 years 1 months ago
Self-Tuning Planned Actions Time to Make Real-Time SOAP Real
This paper proposes a new method for programming and controlling distributed tasks. Applications declare behavior patterns that are used to automatically predict and reserve resou...
Johannes Helander, Stefan B. Sigurdsson
SIGMETRICS
2002
ACM
104views Hardware» more  SIGMETRICS 2002»
13 years 7 months ago
Improving cluster availability using workstation validation
We demonstrate a framework for improving the availability of cluster based Internet services. Our approach models Internet services as a collection of interconnected components, e...
Taliver Heath, Richard P. Martin, Thu D. Nguyen
INTERNET
2010
141views more  INTERNET 2010»
13 years 6 months ago
Computing for Human Experience: Semantics-Empowered Sensors, Services, and Social Computing on the Ubiquitous Web
abstractions, concepts, and actions that characterize human experiences. This will herald computing for human experience (CHE). The CHE vision is built on a suite of technologies t...
Amit Sheth
CSREASAM
2006
13 years 9 months ago
Flexible Cryptographic Component Design for Secure Web Applications
- Although Internet serves many contents and services, it has serious problems of security: the invasion of privacy, hacking and etc. To prevent these problems, two implementations...
Tae Ho Kim, Jong Jin Kim, Chang Hoon Kim, Chun Pyo...
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
12 years 11 months ago
Power management of online data-intensive services
Much of the success of the Internet services model can be attributed to the popularity of a class of workloads that we call Online Data-Intensive (OLDI) services. These workloads ...
David Meisner, Christopher M. Sadler, Luiz Andr&ea...