Sciweavers

360 search results - page 24 / 72
» Distributed policy processing in active-service based infras...
Sort
View
EUROMICRO
2006
IEEE
14 years 2 months ago
Authentication in Stealth Distributed Hash Tables
Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of ...
Andrew MacQuire, Andrew Brampton, Idris A. Rai, Ni...
SACMAT
2011
ACM
12 years 11 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
JPDC
2006
175views more  JPDC 2006»
13 years 8 months ago
Stochastic modeling and analysis of hybrid mobility in reconfigurable distributed virtual machines
Virtualization provides a vehicle to manage the available resources and enhance their utilization in network computing. System dynamics requires virtual machines be distributed an...
Song Fu, Cheng-Zhong Xu
COR
2004
106views more  COR 2004»
13 years 8 months ago
Performance analysis of the DAR(1)/D/c priority queue under partial buffer sharing policy
We analyze a multi-server priority queueing system with partial buffer sharing, where the input is a discrete autoregressive process of order 1 (DAR(1)) which is known as a good m...
Gang Uk Hwang, Bong Dae Choi
IPPS
2006
IEEE
14 years 2 months ago
Load balancing in the presence of random node failure and recovery
In many distributed computing systems that are prone to either induced or spontaneous node failures, the number of available computing resources is dynamically changing in a rando...
Sagar Dhakal, Majeed M. Hayat, Jorge E. Pezoa, Cha...