Sciweavers

3886 search results - page 672 / 778
» Implementing Fault-Tolerant Distributed Applications
Sort
View
SASO
2008
IEEE
14 years 4 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
SBACPAD
2008
IEEE
132views Hardware» more  SBACPAD 2008»
14 years 4 months ago
Aspect-Based Patterns for Grid Programming
The development of grid algorithms is frequently hampered by limited means to describe topologies and lack of support for the invasive composition of legacy components in order to...
Luis Daniel Benavides Navarro, Rémi Douence...
AICT
2007
IEEE
180views Communications» more  AICT 2007»
14 years 4 months ago
BPTraSha: A Novel Algorithm for Shaping Bursty Nature of Internet Traffic
Various researchers have reported that traffic measurements demonstrate considerable burstiness on several time scales, with properties of self-similarity. Also, the rapid developm...
Karim Mohammed Rezaul, Vic Grout
ASIAMS
2007
IEEE
14 years 4 months ago
On Syntactic Composability and Model Reuse
Composability, the capability to select and assemble offthe-shelf model components in various combinations to satisfy user requirements, is an appealing approach in reducing the t...
Claudia Szabo, Yong Meng Teo
CLUSTER
2007
IEEE
14 years 4 months ago
Satisfying your dependencies with SuperMatrix
— SuperMatrix out-of-order scheduling leverages el abstractions and straightforward data dependency analysis to provide a general-purpose mechanism for obtaining parallelism from...
Ernie Chan, Field G. Van Zee, Enrique S. Quintana-...