Sciweavers

360 search results - page 44 / 72
» Distributed policy processing in active-service based infras...
Sort
View
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 2 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
GLOBECOM
2009
IEEE
14 years 18 days ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
ESCIENCE
2006
IEEE
14 years 2 months ago
Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid
The ability to dynamically create and subsequently manage secure virtual organisations (VO) is one of the key challenges facing the Grid community. Existing approaches for establi...
Richard O. Sinnott, David W. Chadwick, Jos Koetsie...
IPPS
2003
IEEE
14 years 2 months ago
Better Real-Time Response for Time-Share Scheduling
As computing systems of all types grow in power and complexity, it is common to want to simultaneously execute processes with different timeliness constraints. Many systems use CP...
Scott A. Banachowski, Scott A. Brandt
JCIT
2007
98views more  JCIT 2007»
13 years 8 months ago
Load Indices on Heterogeneous Systems- Past, Present and Future
To achieve superior performance levels when working with heterogeneous distributed platforms, processscheduling decisions must be based essentially on the platform’s features an...
Kalinka Regina Lucas Jaquie Castelo Branco, Edward...