Sciweavers

6555 search results - page 1181 / 1311
» Secure attribute-based systems
Sort
View
129
Voted
CASCON
1996
126views Education» more  CASCON 1996»
15 years 3 months ago
Evaluating the costs of management: a distributed applications management testbed
In today's distributed computing environments, users are makingincreasing demands on the systems, networks, and applications they use. Users are coming to expect performance,...
Michael Katchabaw, Stephen L. Howard, Andrew D. Ma...
DGO
2009
175views Education» more  DGO 2009»
15 years 3 months ago
Modelling task delegation for human-centric eGovernment workflows
The execution of cross-domain eGovernment applications is a challenging topic. eGovernment organisations are facilitated and conducted using workflow management systems. Workflows...
Khaled Gaaloul, François Charoy, Andreas Sc...
HPDC
2010
IEEE
15 years 3 months ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim
128
Voted
ARTMED
2006
86views more  ARTMED 2006»
15 years 2 months ago
Spatiotemporal reasoning about epidemiological data
Objective. In this article, we propose new methods to visualize and reason about spatiotemporal epidemiological data. Background. Efficient computerized reasoning about epidemics ...
Peter Z. Revesz, Shasha Wu
MICRO
2008
IEEE
126views Hardware» more  MICRO 2008»
15 years 2 months ago
Multicore Resource Management
UAL PRIVATE MACHINE ABSTRACTION WOULD ALLOW SOFTWARE POLICIES TO EXPLICITLY MANAGE MICROARCHITECTURE RESOURCES. VPM POLICIES, IMPLEMENTED PRIMARILY IN SOFTWARE, TRANSLATE APPLICATI...
Kyle J. Nesbit, Miquel Moretó, Francisco J....
« Prev « First page 1181 / 1311 Last » Next »