Sciweavers

177 search results - page 30 / 36
» Dynamic and risk-aware network access management
Sort
View
CCS
2009
ACM
14 years 8 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
ICDE
2005
IEEE
120views Database» more  ICDE 2005»
14 years 9 months ago
Progressive Distributed Top k Retrieval in Peer-to-Peer Networks
Query processing in traditional information management systems has moved from an exact match model to more flexible paradigms allowing cooperative retrieval by aggregating the dat...
Wolf-Tilo Balke, Wolfgang Nejdl, Wolf Siberski, Uw...
SAINT
2008
IEEE
14 years 2 months ago
Local Production, Local Consumption Storage Economics for Peer-to-Peer Systems
Autonomy of peer-to-peer (P2P) systems requires some form of economies. Forwardable storage claims of Samsara[1] can define a common value in computer networks, and possibly be a...
Kenji Saito, Eiichi Morino
ICCS
2007
Springer
14 years 1 months ago
Implementing Virtual Buffer for Electric Power Grids
The electric power grid is a vital network for every aspect of our life. The lack of buffer between generation and consumption makes the power grid unstable and fragile. While larg...
Rong Gao, Lefteri H. Tsoukalas
ICS
2005
Tsinghua U.
14 years 1 months ago
Continuous Replica Placement schemes in distributed systems
The Replica Placement Problem (RPP) aims at creating a set of duplicated data objects across the nodes of a distributed system in order to optimize certain criteria. Typically, RP...
Thanasis Loukopoulos, Petros Lampsas, Ishfaq Ahmad