Sciweavers

185 search results - page 10 / 37
» File and Memory Security Analysis for Grid Systems
Sort
View
ACNS
2008
Springer
88views Cryptology» more  ACNS 2008»
14 years 1 months ago
On the Effectiveness of Internal Patching Against File-Sharing Worms
File-sharing worms have been terrorizing Peer-to-peer (P2P) systems in recent years. Existing defenses relying on users’ individual recoveries or limiting users’ file-sharing ...
Liang Xie, Hui Song, Sencun Zhu
CLADE
2008
IEEE
13 years 9 months ago
A grid-enabled workflow system for reservoir uncertainty analysis
Reservoir uncertainty analysis is significant for petroleum engineers for predictions of reservoir performance. However, analysis of reservoir performance uncertainty is challengi...
Emrah Ceyhan, Gabrielle Allen, Christopher D. Whit...
SAFECOMP
2009
Springer
14 years 1 months ago
Reliability Analysis for the Advanced Electric Power Grid: From Cyber Control and Communication to Physical Manifestations of Fa
The advanced electric power grid is a cyber-physical system comprised of physical components such as transmission lines and generators and a network of embedded systems deployed fo...
Ayman Z. Faza, Sahra Sedigh, Bruce M. McMillin
CLUSTER
2004
IEEE
13 years 11 months ago
An evaluation of the close-to-files processor and data co-allocation policy in multiclusters
In multicluster systems, and more generally, in grids, jobs may require co-allocation, i.e., the simultaneous allocation of resources such as processors and input files in multipl...
Hashim H. Mohamed, Dick H. J. Epema
CLUSTER
2002
IEEE
14 years 9 days ago
User-Level Remote Data Access in Overlay Metacomputers
A practical problem faced by users of metacomputers and computational grids is: If my computation can move from one system to another, how can I ensure that my data will still be ...
Jeff Siegel, Paul Lu