Sciweavers

788 search results - page 52 / 158
» Secure Data Objects Replication in Data Grid
Sort
View
TMC
2011
119views more  TMC 2011»
13 years 3 months ago
Temporal Link Signature Measurements for Location Distinction
—We investigate location distinction, the ability of a receiver to determine when a transmitter has changed location, which has application for energy conservation in wireless se...
Neal Patwari, Sneha Kumar Kasera
DICTA
2009
13 years 9 months ago
Modeling Image Context Using Object Centered Grid
Abstract--Context plays a valuable role in any image understanding task confirmed by numerous studies which have shown the importance of contextual information in computer vision t...
Sobhan Naderi Parizi, Ivan Laptev, Alireza Tavakol...
COLCOM
2008
IEEE
14 years 2 months ago
Replication in Overlay Networks: A Multi-objective Optimization Approach
Recently, overlay network-based collaborative applications such as instant messaging, content sharing, and Internet telephony are becoming increasingly popular. Many of these appli...
Osama Al-Haj Hassan, Lakshmish Ramaswamy, John A. ...
DSN
2003
IEEE
14 years 1 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
CONCURRENCY
2008
105views more  CONCURRENCY 2008»
13 years 8 months ago
Coordinating access control in grid services
We describe how to control the cumulative use of distributed grid resources by using coordination aware policy decision points (coordinated PDPs) and an SQL database to hold "...
David W. Chadwick, Linying Su, Romain Laborde