Sciweavers

1040 search results - page 206 / 208
» Resource Usage Verification
Sort
View
JCS
2010
104views more  JCS 2010»
13 years 5 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith
CNSM
2010
13 years 5 months ago
DP+IP = design of efficient backup scheduling
Many industries experience an explosion in digital content. This explosion of electronic documents, along with new regulations and document retention rules, sets new requirements f...
Ludmila Cherkasova, Alex Zhang, Xiaozhou Li
SOCA
2010
IEEE
13 years 5 months ago
Towards a diamond SOA operational model
The triangular operational model with the three roles of service-registry, -provider, and -consumer has been the traditional operational model in Service-oriented Architectures (SO...
Mohammed AbuJarour, Felix Naumann
SOCIALCOM
2010
13 years 5 months ago
Traffic in Social Media I: Paths Through Information Networks
Wikipedia is used every day by people all around the world, to satisfy a variety of information needs. We crosscorrelate multiple Wikipedia traffic data sets to infer various behav...
Jacob Ratkiewicz, Alessandro Flammini, Filippo Men...
SRDS
2010
IEEE
13 years 5 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...