Sciweavers

347 search results - page 11 / 70
» On private computation in incomplete networks
Sort
View
EUROPAR
2006
Springer
13 years 11 months ago
Private Virtual Cluster: Infrastructure and Protocol for Instant Grids
Given current complexity of Grid technologies, the lack of security of P2P systems and the rigidity of VPN technologies make sharing resources belonging to different institutions s...
Ala Rezmerita, Tangui Morlier, Vincent Néri...
CDC
2010
IEEE
106views Control Systems» more  CDC 2010»
13 years 2 months ago
Observational learning in an uncertain world
We study a model of observational learning in social networks in the presence of uncertainty about agents' type distributions. Each individual receives a private noisy signal ...
Daron Acemoglu, Munther A. Dahleh, Asuman E. Ozdag...
TC
2002
13 years 7 months ago
Performance Modeling and Prediction of Nondedicated Network Computing
The low cost and wide availability of networks of workstations have made them an attractive solution for high performance computing. However, while a network of workstations may be...
Linguo Gong, Xian-He Sun, Edward F. Watson
GI
2001
Springer
14 years 4 days ago
Access of Mobile IP Users to Firewall Protected VPNs
: The paper describes an architecture allowing Mobile IP hosts to access to a virtual private network that is protected by a firewall from the public Internet. The implementation b...
Marc Danzeisen, Torsten Braun
PERCOM
2004
ACM
14 years 7 months ago
PrudentExposure: A Private and User-centric Service Discovery Protocol
: Service Discovery as an essential element in pervasive computing environments is widely accepted. Much active research on service discovery has been conducted, but privacy has be...
Feng Zhu, Matt W. Mutka, Lionel M. Ni