Sciweavers

5790 search results - page 30 / 1158
» Distributed programming with distributed authorization
Sort
View
ICTAI
2009
IEEE
14 years 2 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
PPOPP
1993
ACM
13 years 11 months ago
Experiences Using the ParaScope Editor: an Interactive Parallel Programming Tool
The ParaScope Editor is an interactive parallel programming tool that assists knowledgeable users in developing scienti c Fortran programs. It displays the results of sophisticate...
Mary W. Hall, Timothy J. Harvey, Ken Kennedy, Nath...
IPPS
2009
IEEE
14 years 2 months ago
Performance prediction for running workflows under role-based authorization mechanisms
When investigating the performance of running scientific/ commercial workflows in parallel and distributed systems, we often take into account only the resources allocated to the ...
Ligang He, Mark Calleja, Mark Hayes, Stephen A. Ja...
AAAI
2006
13 years 9 months ago
Locally Optimal Algorithms and Solutions for Distributed Constraint Optimization
This paper summarizes the author's recent work in distributed constraint optimization (DCOP). New local algorithms, as well as theoretical results about the types of solution...
Jonathan P. Pearce
INFOCOM
2010
IEEE
13 years 6 months ago
Distributed Caching Algorithms for Content Distribution Networks
—The delivery of video content is expected to gain huge momentum, fueled by the popularity of user-generated clips, growth of VoD libraries, and wide-spread deployment of IPTV se...
Sem C. Borst, Varun Gupta, Anwar Walid