Sciweavers

287 search results - page 46 / 58
» Monitoring Access to Stateful Resources in Grid Environments
Sort
View
JALC
2006
125views more  JALC 2006»
13 years 7 months ago
A Confinement Criterion for Securely Executing Mobile Code
Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
Hervé Grall
CORR
2007
Springer
130views Education» more  CORR 2007»
13 years 7 months ago
Mobile Computing in Physics Analysis - An Indicator for eScience
This paper presents the design and implementation of a Grid-enabled physics analysis environment for handheld and other resource-limited computing devices as one example of the us...
Arshad Ali, Ashiq Anjum, Tahir Azim, Julian J. Bun...
CCGRID
2006
IEEE
14 years 1 months ago
Actor Provenance Capture With Ganglia
Provenance is generally defined as the documentation of a process that leads to some result, and has long been recognised as being fundamental to the development of problem solvi...
Ian Wootten, Shrija Rajbhandari, Omer F. Rana, Jas...
AIM
2002
13 years 7 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
FGCS
2010
186views more  FGCS 2010»
13 years 6 months ago
A grid portal for solving geoscience problems using distributed knowledge discovery services
This paper describes our research effort to employ Grid technologies to enable the development of geoscience applications by integrating workflow technologies with data mining r...
Gianluigi Folino, Agostino Forestiero, Giuseppe Pa...