Sciweavers

3605 search results - page 599 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
ICAC
2006
IEEE
14 years 4 months ago
Weatherman: Automated, Online and Predictive Thermal Mapping and Management for Data Centers
— Recent advances have demonstrated the potential benefits of coordinated management of thermal load in data centers, including reduced cooling costs and improved resistance to ...
Justin D. Moore, Jeffrey S. Chase, Parthasarathy R...
ACMSE
2007
ACM
14 years 2 months ago
Chinese remainder theorem based group key management
In this paper, we present two new centralized group key management protocols based on the Chinese Remainder Theorem (CRT). By shifting more computing load onto the key server we o...
Xinliang Zheng, Chin-Tser Huang, Manton M. Matthew...
WWW
2005
ACM
14 years 11 months ago
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
Reputation systems have been popular in estimating the trustworthiness and predicting the future behavior of nodes in a large-scale distributed system where nodes may transact wit...
Mudhakar Srivatsa, Li Xiong, Ling Liu
PDC
2004
ACM
14 years 4 months ago
Lost in translation: a critical analysis of actors, artifacts, agendas, and arenas in participatory design
As computer technologies start to permeate the everyday activities of a continuously growing population, social and technical as well as political and legal issues will surface. P...
Rogério De Paula
LISA
2008
14 years 29 days ago
Devolved Management of Distributed Infrastructures with Quattor
In recent times a new kind of computing system has emerged: a distributed infrastructure composed of multiple physical sites in different administrative domains. This model introd...
Stephen Childs, Marco Emilio Poleggi, Charles Loom...