Sciweavers

964 search results - page 39 / 193
» On Securely Scheduling a Meeting
Sort
View
SBACPAD
2007
IEEE
85views Hardware» more  SBACPAD 2007»
14 years 5 months ago
Exigency-based real-time scheduling policy to provide absolute QoS for web services
— Telemedicine, distance learning and e-commerce applications impose time constraints directly related to the efficacy of their operations. In order to offer reliability levels ...
Lucas S. Casagrande, Rodrigo Fernandes de Mello, R...
INFOCOM
2012
IEEE
12 years 1 months ago
DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networks
Abstract—Energy is the most precious resource in wireless sensor networks. To ensure sustainable operations, wireless sensor systems need to harvest energy from environments. The...
Ting Zhu, Abedelaziz Mohaisen, Yi Ping, Don Towsle...
SEC
2007
14 years 11 days ago
Security Remarks on a Convertible Nominative Signature Scheme
A nominative signature scheme allows a nominator (i.e. the signer) and a nominee (i.e. a designated verifier) to jointly generate and publish a signature so that only the nominee ...
Guilin Wang, Feng Bao
CSFW
2008
IEEE
14 years 5 months ago
A Type System for Observational Determinism
Zdancewic and Myers introduced observational determinism as a scheduler independent notion of security for concurrent programs. This paper proposes a type system for verifying obs...
Tachio Terauchi
GRID
2007
Springer
13 years 11 months ago
A Tool for Prioritizing DAGMan Jobs and its Evaluation
It is often difficult to perform efficiently a collection of jobs with complex job dependencies due to temporal unpredictability of the grid. One way to mitigate the unpredictabili...
Grzegorz Malewicz, Ian T. Foster, Arnold L. Rosenb...