Sciweavers

359 search results - page 39 / 72
» Information Modeling: The Process and the Required Competenc...
Sort
View
CCS
2003
ACM
14 years 19 days ago
k-anonymous message transmission
Informally, a communication protocol is sender k - anonymous if it can guarantee that an adversary, trying to determine the sender of a particular message, can only narrow down it...
Luis von Ahn, Andrew Bortz, Nicholas J. Hopper
HPDC
1999
IEEE
13 years 11 months ago
Remote Application Scheduling on Metacomputing Systems
Efficient and robust metacomputing requires the decomposition of complex jobs into tasks that must be scheduled on distributed processing nodes. There are various ways of creating...
Heath A. James, Kenneth A. Hawick
JUCS
2010
159views more  JUCS 2010»
13 years 2 months ago
Developing a Secure Mobile Grid System through a UML Extension
: The idea of developing software through systematic development processes to improve software quality is not new. Nevertheless, there are still many information systems such as th...
David G. Rosado, Eduardo Fernández-Medina, ...
OTM
2005
Springer
14 years 27 days ago
Shelter from the Storm: Building a Safe Archive in a Hostile World
Abstract. The storing of data and configuration files related to scientific experiments is vital if those experiments are to remain reproducible, or if the data is to be shared ...
Jon MacLaren, Gabrielle Allen, Chirag Dekate, Dayo...
GIS
2004
ACM
14 years 8 months ago
Representing spatiality in a conceptual multidimensional model
Data Warehouses and On-Line Analytical Processing systems rely on a multidimensional model that includes dimensions, hierarchies, and measures. Such model allows to express users&...
Elzbieta Malinowski, Esteban Zimányi