Sciweavers

148 search results - page 16 / 30
» Implementation of Process Migration in Amoeba
Sort
View
SACMAT
2003
ACM
14 years 25 days ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
MOBICOM
2004
ACM
14 years 1 months ago
MobiDesk: mobile virtual desktop computing
We present MobiDesk, a mobile virtual desktop computing hosting infrastructure that leverages continued improvements in network speed, cost, and ubiquity to address the complexity...
Ricardo A. Baratto, Shaya Potter, Gong Su, Jason N...
ERLANG
2006
ACM
14 years 1 months ago
Concurrency oriented programming in termite scheme
Termite Scheme is a variant of Scheme intended for distributed computing. It offers a simple and powerful concurrency model, inspired by the Erlang programming language, which is ...
Guillaume Germain
EMO
2005
Springer
110views Optimization» more  EMO 2005»
14 years 1 months ago
Parallelization of Multi-objective Evolutionary Algorithms Using Clustering Algorithms
Abstract. While Single-Objective Evolutionary Algorithms (EAs) parallelization schemes are both well established and easy to implement, this is not the case for Multi-Objective Evo...
Felix Streichert, Holger Ulmer, Andreas Zell
PADS
1997
ACM
13 years 11 months ago
Distributed Simulation of Spatially Explicit Ecological Models
Large-scale ecological simulations are natural candidates for distributed discrete event simulation. In optimistic simulation of spatially explicit models, a difficult problem ar...
Kevin Glass, Marilynn Livingston, John S. Conery