Sciweavers

40 search results - page 6 / 8
» On the Malicious Participants Problem in Computational Grid
Sort
View
NDSS
2008
IEEE
14 years 4 months ago
Halo: High-Assurance Locate for Distributed Hash Tables
We study the problem of reliably searching for resources in untrusted peer-to-peer networks, where a significant portion of the participating network nodes may act maliciously to...
Apu Kapadia, Nikos Triandopoulos
P2P
2008
IEEE
149views Communications» more  P2P 2008»
14 years 4 months ago
AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems
In open environments, such as mobile peer-to-peer systems, participants may need to access resources from unknown users. A critical security concern in such systems is the access ...
Brent Lagesse, Mohan Kumar, Matthew Wright
SC
2005
ACM
14 years 3 months ago
DI-GRUBER: A Distributed Approach to Grid Resource Brokering
Managing usage service level agreements (USLAs) within environments that integrate participants and resources spanning multiple physical institutions is a challenging problem. Mai...
Catalin Dumitrescu, Ioan Raicu, Ian T. Foster
CLUSTER
2008
IEEE
14 years 4 months ago
Empirical-based probabilistic upper bounds for urgent computing applications
—Scientific simulation and modeling often aid in making critical decisions in such diverse fields as city planning, severe weather prediction and influenza modeling. In some o...
Nick Trebon, Peter H. Beckman
PODC
2009
ACM
14 years 7 months ago
The wireless synchronization problem
In this paper, we study the wireless synchronization problem which requires devices activated at different times on a congested single-hop radio network to synchronize their roun...
Shlomi Dolev, Seth Gilbert, Rachid Guerraoui, Fabi...