Sciweavers

1040 search results - page 9 / 208
» Resource Usage Verification
Sort
View
ISCAS
2003
IEEE
106views Hardware» more  ISCAS 2003»
14 years 19 days ago
Resource adaptation based on MPEG-21 usage environment descriptions
This paper addresses several aspects related to the distribution of content. The first aim is to provide an overview of the Universal Multimedia Access (UMA) concept. The primary...
Huifang Sun, Anthony Vetro, K. Asai
CCS
2008
ACM
13 years 9 months ago
Mechanisms for usage control
Usage control is a generalization of access control that also addresses how data is used after it is released. We present a formal model for different mechanisms that can enforce ...
Alexander Pretschner, Manuel Hilty, David A. Basin...
CLUSTER
2002
IEEE
13 years 7 months ago
Security Implications of Typical Grid Computing Usage Scenarios
A Computational Grid is a collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users easy access to these...
Marty Humphrey, Mary R. Thompson
WETICE
2007
IEEE
14 years 1 months ago
Enhancing Grid Usage through Semantic Metadata
— The coordinated sharing of resources to address computational problems is a central issue in environments of Grid computing. Two important scenarios arise from this issue. Firs...
Alexandre Ceasar Tavares Vidal, Sergio Takeo Kofuj...