Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
This paper presents the design and implementation of a Grid-enabled physics analysis environment for handheld and other resource-limited computing devices as one example of the us...
Arshad Ali, Ashiq Anjum, Tahir Azim, Julian J. Bun...
Provenance is generally defined as the documentation of a process that leads to some result, and has long been recognised as being fundamental to the development of problem solvi...
Ian Wootten, Shrija Rajbhandari, Omer F. Rana, Jas...
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
This paper describes our research effort to employ Grid technologies to enable the development of geoscience applications by integrating workflow technologies with data mining r...
Gianluigi Folino, Agostino Forestiero, Giuseppe Pa...