Sciweavers

1205 search results - page 208 / 241
» On P Systems with Bounded Parallelism
Sort
View
NSDI
2007
13 years 10 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
CORR
2010
Springer
148views Education» more  CORR 2010»
13 years 7 months ago
Data Sharing Options for Scientific Workflows on Amazon EC2
Efficient data management is a key component in achieving good performance for scientific workflows in distributed environments. Workflow applications typically communicate data be...
Gideon Juve, Ewa Deelman, Karan Vahi, Gaurang Meht...
CUZA
2002
129views more  CUZA 2002»
13 years 7 months ago
Ad Hoc Metacomputing with Compeer
Metacomputing allows the exploitation of geographically seperate, heterogenous networks and resources. Most metacomputers are feature rich and carry a long, complicated installati...
Keith Power, John P. Morrison
SICHERHEIT
2010
13 years 5 months ago
State Transfer for Hypervisor-Based Proactive Recovery of Heterogeneous Replicated Services
Intrusion-tolerant replication enables the construction of systems that tolerate a finite number of malicious faults. An arbitrary number of faults can be tolerated during system ...
Tobias Distler, Rüdiger Kapitza, Hans P. Reis...
FIRSTMONDAY
2010
125views more  FIRSTMONDAY 2010»
13 years 5 months ago
The social environment model: Small heroes and the evolution of human society
Traditional "realistic" theories of social action, whether based on the individual gain heuristics of capitalism or the collective class struggles of communism, cannot e...
Brian Whitworth, Alex P. Whitworth