With the growth of mobile computing, users will have simultaneous access to multiple overlaid networks, each with Zdifferent characteristics, services and costs. This paper introd...
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
The Xen Worlds project at Iowa State University was designed to provide a virtualized lab environment for the Information Assurance program. The large number of off-campus student...
Benjamin R. Anderson, Amy K. Joines, Thomas E. Dan...
The Grid paradigm of accessing heterogeneous distributed resources proved to be extremely effective, as many organizations are relying on Grid middlewares for their computational ...
Paolo Andreetto, Sergio Andreozzi, Antonia Ghisell...
Applications that use collections of very large, distributed datasets have become an increasingly important part of science and engineering. With high performance wide-area networ...