Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...
—Cloud computing is a style of computing in which dynamically scalable and commonly virtualized resources are provided as a service over the Internet. This paper, first presents ...
The applications in many scientific fields, like bioinformatics and high-energy physics etc, increasingly demand the computing infrastructures can provide more computing power and...
Xiaohui Wei, Zhaohui Ding, Wilfred W. Li, Osamu Ta...
Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources, and are rapidly emerging as a technology for large-scale, lowcost, autom...
We describe a prototypical storage service through which we are addressing some of the open storage issues in wide-area distributed high-performance computing. We discuss some of t...