Sciweavers

1966 search results - page 294 / 394
» The Distributed Virtual Windtunnel
Sort
View
DMDW
2000
118views Management» more  DMDW 2000»
15 years 4 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
WSC
1998
15 years 4 months ago
Bootstrapping and Validation of Metamodels in Simulation
Bootstrapping is a resampling technique that requires less computer time than simulation does. Bootstrapping -like simulation-must be defined for each type of application. This pa...
Jack P. C. Kleijnen, A. J. Feelders, Russell C. H....
CPHYSICS
2007
119views more  CPHYSICS 2007»
15 years 3 months ago
Data grid deployment for high energy physics in Japan
Recent activities in Japan to deploy a data grid for high energy physics will be reported. Japanese collaboration of LHC-ATLAS experiment is now preparing a Tier-2 analysis center...
Hiroshi Sakamoto
AIR
2005
158views more  AIR 2005»
15 years 2 months ago
Review on Computational Trust and Reputation Models
The scientific research in the area of computational mechanisms for trust and reputation in virtual societies is a recent discipline oriented to increase the reliability and perfor...
Jordi Sabater, Carles Sierra
COMCOM
2008
104views more  COMCOM 2008»
15 years 2 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...