Sciweavers

305 search results - page 22 / 61
» From External to Internal Regret
Sort
View
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
14 years 2 months ago
Achieving 10 Gb/s using safe and transparent network interface virtualization
: © Achieving 10 Gb/s using Safe and Transparent Network Interface Virtualization Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turner, Alan L. Cox, Scott Rixner HP Laboratories H...
Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turn...
IEEEARES
2010
IEEE
14 years 2 months ago
Solving the Transitive Access Problem for the Services Oriented Architecture
: © Solving the Transitive Access Problem for the Services Oriented Architecture Alan H. Karp, Jun Li HP Laboratories HPL-2008-204R1 SOA, web services, access control, RBAC, PBAC,...
Alan H. Karp, Jun Li
ICCS
2009
Springer
14 years 2 months ago
On the Origin of Grid Species: The Living Application
We present the living application, a method to autonomously manage applications on the grid. During its execution on the grid, the living application makes choices on the resources...
Derek Groen, Stefan Harfst, Simon Portegies Zwart
ACSAC
2008
IEEE
14 years 2 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
DOCENG
2008
ACM
13 years 9 months ago
Automated repurposing of implicitly structured documents
: From the least to most prominent elements, documents are arranged in a tacit visual hierarchy. This is essential for document scanning and comprehension. This conceptual structur...
Helen Balinsky, Anthony Wiley, Michael Rhodes, Alf...