Sciweavers

180 search results - page 23 / 36
» Incident response requirements for distributed security info...
Sort
View
JSSPP
2009
Springer
14 years 2 months ago
Decentralized Grid Scheduling with Evolutionary Fuzzy Systems
In this paper, we address the problem of finding workload exchange policies for decentralized Computational Grids using an Evolutionary Fuzzy System. To this end, we establish a n...
Alexander Fölling, Christian Grimme, Joachim ...
EURONGI
2006
Springer
13 years 11 months ago
Job Scheduling for Maximal Throughput in Autonomic Computing Systems
Abstract. Autonomic computing networks manage multiple tasks over a distributed network of resources. In this paper, we view an autonomic computing system as a network of queues, w...
Kevin Ross, Nicholas Bambos
MOBISYS
2008
ACM
14 years 7 months ago
Virtual trip lines for distributed privacy-preserving traffic monitoring
Automotive traffic monitoring using probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, ...
Baik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban, ...
CASSIS
2005
Springer
14 years 1 months ago
The Architecture of a Privacy-Aware Access Control Decision Component
Today many interactions are carried out online through Web sites and e-services and often private and/or sensitive information is required by service providers. A growing concern r...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
CCS
2001
ACM
14 years 4 days ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé