Sciweavers

1973 search results - page 393 / 395
» Network Performance Assessment for Neurofuzzy Data Modelling
Sort
View
USS
2008
13 years 10 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
TIP
2010
107views more  TIP 2010»
13 years 3 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
SOSP
2005
ACM
14 years 5 months ago
BAR fault tolerance for cooperative services
This paper describes a general approach to constructing cooperative services that span multiple administrative domains. In such environments, protocols must tolerate both Byzantin...
Amitanand S. Aiyer, Lorenzo Alvisi, Allen Clement,...
DSRT
2006
IEEE
14 years 2 months ago
Grid-enabling FIRST: Speeding Up Simulation Applications Using WinGrid
The vision of grid computing is to make computational power, storage capacity, data and applications available to users as readily as electricity and other utilities. Grid infrast...
Navonil Mustafee, Anders Alstad, Bjorn Larsen, Sim...
IADIS
2004
13 years 10 months ago
Moginma: an autonomous grid node monitoring agent
The accelerated development in grid computing has positioned it as a promising next generation computing platform. It enables the creation of virtual organizations (VO) for sharin...
Arshad Ali, Fawad Nazir, Hamid Abbas Burki, Tallat...