Sciweavers

282 search results - page 42 / 57
» Private Policy Negotiation
Sort
View
ESCIENCE
2006
IEEE
14 years 1 months ago
Using Checkpointing to Enhance Turnaround Time on Institutional Desktop Grids
In this paper, we present a checkpoint-based scheme to improve the turnaround time of bag-of-tasks applications executed on institutional desktop grids. We propose to share checkp...
Patrício Domingues, Artur Andrzejak, Lu&iac...
HICSS
2006
IEEE
127views Biometrics» more  HICSS 2006»
14 years 1 months ago
Processing of Data Streams with Prediction Functions
Networks of sensors arise naturally in many different fields, from industrial applications (e.g., monitoring of environmental parameters in a chemical plant) to surveillance appl...
Sergio Ilarri, Ouri Wolfson, Eduardo Mena, Arantza...
MADNES
2005
Springer
14 years 27 days ago
An XML Standards Based Authorization Framework for Mobile Agents
An outstanding security problem in mobile agent systems is resource access control, or authorization in its broader sense. In this paper we present an authorization framework for m...
Guillermo Navarro, Joan Borrell
WPES
2004
ACM
14 years 24 days ago
Will your digital butlers betray you?
The cost of data storage is now so low that there is little necessity ever to delete anything. The consequence is denied oblivion—digital systems that remember forever and can b...
Frank Stajano
HICSS
2007
IEEE
122views Biometrics» more  HICSS 2007»
14 years 1 months ago
Enterprise Information Architecture (EIA): Assessment of Current Practices in Malaysian Organizations
In this paper we described the findings based on a research study on current Enterprise Information Architecture (EIA) practices in Malaysian organizations. Ten organizations from...
Rafidah Abd. Razak, Zulkhairi Md. Dahalin, Rohaya ...