Sciweavers

1988 search results - page 218 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
CCS
2004
ACM
15 years 8 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
126
Voted
VRML
2003
ACM
15 years 7 months ago
A multi-user virtual environment system with extensible animations
Multi-user virtual environment (MUVE) systems integrate the technologies of virtual reality and distributed system to allow users to interact with each other in a realistic virtua...
Yi-Lin Liu, Tsai-Yen Li
HPDC
2002
IEEE
15 years 7 months ago
Dynamic Right-Sizing in FTP (drsFTP): Enhancing Grid Performance in User-Space
With the advent of computational grids, networking performance over the wide-area network (WAN) has become a critical component in the grid infrastructure. Unfortunately, many hig...
Mark K. Gardner, Wu-chun Feng, Mike Fisk
105
Voted
IPPS
2006
IEEE
15 years 8 months ago
Lossless compression for large scale cluster logs
The growing computational and storage needs of several scientific applications mandate the deployment of extreme-scale parallel machines, such as IBM’s Blue Gene/L which can acc...
R. Balakrishnan, Ramendra K. Sahoo
133
Voted
AISADM
2007
Springer
15 years 8 months ago
Robust Agent Communities
We believe that intelligent information agents will represent their users interest in electronic marketplaces and other forums to trade, exchange, share, identify, and locate goods...
Sandip Sen, Sabyasachi Saha, Stéphane Airia...