Sciweavers

1988 search results - page 352 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
CCS
2006
ACM
14 years 17 days ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
CCS
2011
ACM
12 years 8 months ago
Fashion crimes: trending-term exploitation on the web
Online service providers are engaged in constant conflict with miscreants who try to siphon a portion of legitimate traffic to make illicit profits. We study the abuse of “tr...
Tyler Moore, Nektarios Leontiadis, Nicolas Christi...
GRID
2006
Springer
13 years 8 months ago
Labs of the World, Unite!!!
: eScience is rapidly changing the way we do research. As a result, many research labs now need non-trivial computational power. Grid and voluntary computing are well-established s...
Walfredo Cirne, Francisco Vilar Brasileiro, Nazare...
EUROPAR
2009
Springer
14 years 3 months ago
MPI Applications on Grids: A Topology Aware Approach
Porting on grids complex MPI applications involving collective communications requires significant program modification, usually dedicated to a single grid structure. The diffi...
Camille Coti, Thomas Hérault, Franck Cappel...
HPCC
2007
Springer
14 years 3 months ago
Towards Scalable Event Tracing for High End Systems
Although event tracing of parallel applications offers highly detailed performance information, tracing on current leading edge systems may lead to unacceptable perturbation of the...
Kathryn Mohror, Karen L. Karavanic