Sciweavers

1966 search results - page 294 / 394
» The Distributed Virtual Windtunnel
Sort
View
DMDW
2000
118views Management» more  DMDW 2000»
13 years 11 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
WSC
1998
13 years 11 months ago
Bootstrapping and Validation of Metamodels in Simulation
Bootstrapping is a resampling technique that requires less computer time than simulation does. Bootstrapping -like simulation-must be defined for each type of application. This pa...
Jack P. C. Kleijnen, A. J. Feelders, Russell C. H....
CPHYSICS
2007
119views more  CPHYSICS 2007»
13 years 10 months ago
Data grid deployment for high energy physics in Japan
Recent activities in Japan to deploy a data grid for high energy physics will be reported. Japanese collaboration of LHC-ATLAS experiment is now preparing a Tier-2 analysis center...
Hiroshi Sakamoto
AIR
2005
158views more  AIR 2005»
13 years 10 months ago
Review on Computational Trust and Reputation Models
The scientific research in the area of computational mechanisms for trust and reputation in virtual societies is a recent discipline oriented to increase the reliability and perfor...
Jordi Sabater, Carles Sierra
COMCOM
2008
104views more  COMCOM 2008»
13 years 9 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...