Sciweavers

3368 search results - page 464 / 674
» GRID Computing
Sort
View
112
Voted
CG
2006
Springer
15 years 2 months ago
Connectivity preserving digitization of blurred binary images in 2D and 3D
Connectivity and neighborhood are fundamental topological properties of objects in pictures. Since the input for any image analysis algorithm is a digital image, which does not ne...
Peer Stelldinger, Ullrich Köthe
123
Voted
HPDC
2007
IEEE
15 years 9 months ago
A statistical approach to risk mitigation in computational markets
We study stochastic models to mitigate the risk of poor Quality-of-Service (QoS) in computational markets. Consumers who purchase services expect both price and performance guaran...
Thomas Sandholm, Kevin Lai
ACMSE
2004
ACM
15 years 8 months ago
A collaborative problem-solving framework for mobile devices
The explosive growth in the number of mobile devices such as Internet-enabled cellular phones, wireless handheld devices, wireless laptops, and tablet PCs has driven the correspon...
Stanislav Kurkovsky, Bhagyavati, Arris Ray
157
Voted
AIM
2002
15 years 2 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
131
Voted
ICAC
2006
IEEE
15 years 8 months ago
The Laundromat Model for Autonomic Cluster Computing
Traditional High Performance Computing systems require extensive management and suffer from security and configuration problems. This paper presents a new clustermanagement syste...
Jacob Gorm Hansen, Eske Christiansen, Eric Jul