Sciweavers

837 search results - page 140 / 168
» Rewriting-Based Access Control Policies
Sort
View
ESA
2001
Springer
75views Algorithms» more  ESA 2001»
13 years 12 months ago
Strongly Competitive Algorithms for Caching with Pipelined Prefetching
Suppose that a program makes a sequence of m accesses (references) to data blocks, the cache can hold k < m blocks, an access to a block in the cache incurs one time unit, and ...
Alexander Gaysinsky, Alon Itai, Hadas Shachnai
CONCURRENCY
2008
102views more  CONCURRENCY 2008»
13 years 7 months ago
Dynamic data replication in LCG 2008
To provide performant access to data from high energy physics experiments such as the Large Hadron Collider (LHC), controlled replication of files among grid sites is required. Dy...
Caitriana Nicholson, David G. Cameron, A. T. Doyle...
SYSTOR
2009
ACM
14 years 1 months ago
DHIS: discriminating hierarchical storage
A typical storage hierarchy comprises of components with varying performance and cost characteristics, providing multiple options for data placement. We propose and evaluate a hie...
Chaitanya Yalamanchili, Kiron Vijayasankar, Erez Z...
SASO
2008
IEEE
14 years 1 months ago
Self-Organizing Dynamic Ad Hoc Grids
Resource management for ad hoc grids is challenging due to the participation of heterogeneous, dynamic, autonomous and ephemeral nodes. Different underlying network infrastructure...
Tariq Abdullah, Vassiliy Sokolov, Behnaz Pourebrah...
MADNES
2005
Springer
14 years 26 days ago
An XML Standards Based Authorization Framework for Mobile Agents
An outstanding security problem in mobile agent systems is resource access control, or authorization in its broader sense. In this paper we present an authorization framework for m...
Guillermo Navarro, Joan Borrell