Sciweavers

802 search results - page 81 / 161
» Security Policy Reconciliation in Distributed Computing Envi...
Sort
View
CLUSTER
2008
IEEE
14 years 3 months ago
Empirical-based probabilistic upper bounds for urgent computing applications
—Scientific simulation and modeling often aid in making critical decisions in such diverse fields as city planning, severe weather prediction and influenza modeling. In some o...
Nick Trebon, Peter H. Beckman
PKDD
2007
Springer
214views Data Mining» more  PKDD 2007»
14 years 3 months ago
Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework
Abstract. Analysis of privacy-sensitive data in a multi-party environment often assumes that the parties are well-behaved and they abide by the protocols. Parties compute whatever ...
Hillol Kargupta, Kamalika Das, Kun Liu
HPDC
2000
IEEE
14 years 1 months ago
Resource Management through Multilateral Matchmaking
Federated distributed systems present new challenges to resource management, which cannot be met by conventional systems that employ relatively static resource models and centrali...
Rajesh Raman, Miron Livny, Marvin H. Solomon
ATAL
2005
Springer
14 years 2 months ago
Exploiting belief bounds: practical POMDPs for personal assistant agents
Agents or agent teams deployed to assist humans often face the challenges of monitoring the state of key processes in their environment (including the state of their human users t...
Pradeep Varakantham, Rajiv T. Maheswaran, Milind T...
PDP
2010
IEEE
14 years 2 months ago
Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices
—Data security is one of the major challenges that prevents the wider acceptance of mobile devices, especially within business and government environments. It is non-trivial to p...
Paolo Gasti, Yu Chen