Sciweavers

964 search results - page 38 / 193
» On Securely Scheduling a Meeting
Sort
View
ESORICS
2010
Springer
14 years 1 days ago
Verifying Security Property of Peer-to-Peer Systems Using CSP
Due to their nature, Peer-to-Peer (P2P) systems are subject to a wide range of security issues. In this paper, we focus on a specific security property, called the root authenticit...
Tien Tuan Anh Dinh, Mark Ryan
ENTCS
2006
145views more  ENTCS 2006»
13 years 11 months ago
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Cas J. F. Cremers
IISWC
2008
IEEE
14 years 5 months ago
Energy-aware application scheduling on a heterogeneous multi-core system
Heterogeneous multi-core processors are attractive for power efficient computing because of their ability to meet varied resource requirements of diverse applications in a workloa...
Jian Chen, Lizy Kurian John
GLOBECOM
2007
IEEE
14 years 5 months ago
An Analytical Model for a Book-Ahead Bandwidth Scheduler
— Optical networks with book-ahead bandwidth schedulers are being deployed to meet the high-speed and predictable-service networking requirements of applications in the scientiï¬...
Xiangfei Zhu, Mark E. McGinley, Tao Li, Malathi Ve...
ICPPW
2007
IEEE
14 years 5 months ago
A Quality-Driven Algorithm for Resource Scheduling Based on Market Model on Grid
Several challenges about computational grid exist in integrating, coordinating and managing of resources and scheduling of applications, due to distributed resources at various le...
Lei Tang, Zhiyi Yang, Zhiwen Yu, Yunlan Wang