Sciweavers

1040 search results - page 182 / 208
» Resource Usage Verification
Sort
View
ACSAC
2004
IEEE
14 years 1 months ago
Security Policies to Mitigate Insider Threat in the Document Control Domain
With rapid advances in online technologies, organizations are migrating from paper based resources to digital documents to achieve high responsiveness and ease of management. Thes...
Suranjan Pramanik, Vidyaraman Sankaranarayanan, Sh...
HPDC
2010
IEEE
13 years 11 months ago
Exploring application and infrastructure adaptation on hybrid grid-cloud infrastructure
Clouds are emerging as an important class of distributed computational resources and are quickly becoming an integral part of production computational infrastructures. An importan...
Hyunjoo Kim, Yaakoub El Khamra, Shantenu Jha, Mani...
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 9 months ago
The Power of Nondeterminism in Self-Assembly
tigate the role of nondeterminism in Winfree's abstract Tile Assembly Model (aTAM), which was conceived to model artificial molecular self-assembling systems constructed from...
Nathaniel Bryans, Ehsan Chiniforooshan, David Doty...
JCP
2007
154views more  JCP 2007»
13 years 9 months ago
Introducing Virtual Private Overlay Network Services in Large Scale Grid Infrastructures
—The computational Grid concept is gaining great popularity as the best way to deliver access to a wide range of distributed computing and data resources. But, as Grids move from...
Francesco Palmieri
TON
2008
109views more  TON 2008»
13 years 9 months ago
Efficient routing in intermittently connected mobile networks: the single-copy case
Abstract--Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are m...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...