Sciweavers

450 search results - page 67 / 90
» Research on Security Architecture and Protocols of Grid Comp...
Sort
View
SP
2009
IEEE
128views Security Privacy» more  SP 2009»
14 years 5 months ago
Quantifying Information Leaks in Outbound Web Traffic
As the Internet grows and network bandwidth continues to increase, administrators are faced with the task of keeping confidential information from leaving their networks. Today’...
Kevin Borders, Atul Prakash
ICPPW
2009
IEEE
14 years 5 months ago
Multiprocessor Synchronization and Hierarchical Scheduling
Multi-core architectures have received significant interest as thermal and power consumption problems limit further increase of speed in single-cores. In the multi-core research ...
Farhang Nemati, Moris Behnam, Thomas Nolte
ESCIENCE
2005
IEEE
14 years 4 months ago
A Peer-to-Peer Extension of Network-Enabled Server Systems
DIET (Distributed Interactive Engineering Toolbox) is a set of hierarchical components to design Network Enabled Server (NES) systems. In these systems, clients ask to agents (dis...
Eddy Caron, Frederic Desprez, Cédric Tedesc...
SASN
2003
ACM
14 years 4 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
ICSOC
2007
Springer
14 years 5 months ago
Negotiation of Service Level Agreements: An Architecture and a Search-Based Approach
Software systems built by composing existing services are more and more capturing the interest of researchers and practitioners. The envisaged long term scenario is that services, ...
Elisabetta Di Nitto, Massimiliano Di Penta, Alessi...