Sciweavers

2024 search results - page 323 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
HOTSWUP
2009
ACM
15 years 9 months ago
An Implementation of the Linux Software Repository Model for Other Operating Systems
Year after year, the frequency of updated releases of software continues to increase. Without an automated install process, the result is either that a system installs software wi...
Neil McNab, Anthony Bryan
CCGRID
2001
IEEE
15 years 8 months ago
Replica Selection in the Globus Data Grid
The Globus Data Grid architecture provides a scalable infrastructure for the management of storage resources and data that are distributed across Grid environments. These services...
Sudharshan Vazhkudai, Steven Tuecke, Ian T. Foster
COLCOM
2009
IEEE
15 years 8 months ago
VaaS: Videoconference as a service
- Internet is a place nowadays where interoperating services are offered which can be integrated or mashed up in order to fulfill user demands. This paper proposes a way to offer v...
Pedro Rodriguez, Daniel Gallego, Javier Cervino, F...
129
Voted
RFIDSEC
2010
15 years 3 months ago
Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones
NFC is a standardised technology providing short-range RFID communication channels for mobile devices. Peer-to-peer applications for mobile devices are receiving increased interest...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
148
Voted
JVA
2006
IEEE
15 years 10 months ago
Simulated Annealing for Grid Scheduling Problem
Grid computing is a form of distributed computing that involves coordinating and sharing computing, application, data storage or network resources across dynamic and geographicall...
Stefka Fidanova