Sciweavers

909 search results - page 24 / 182
» The Economics of Large-Memory Computations
Sort
View
GSEM
2004
Springer
14 years 3 months ago
Enhancing Java Grid Computing Security with Resource Control
Abstract. This paper outlines an original Computational Grid deployment protocol which is entirely based on Java, leveraging the portability of this language for distributing custo...
Jarle Hulaas, Walter Binder, Giovanna Di Marzo Ser...
CRITICAL
2005
13 years 11 months ago
From useful idiocy to activism: a Marxist interpretation of computer development
Baran and Sweezy’s 1966 study of U.S. capitalism [2] argued that its fundamental problem is not “diminishing returns” but “the tendency of surplus to rise” – from whic...
Bob Hughes
CHI
2010
ACM
14 years 4 months ago
Computing technology in international development: who, what, where, when, why and how?
BuildingonthesuccessesofpriorworkshopsatCHI andotherHCIconferencesoncomputingin internationaldevelopment,weproposeapanelto engagewiththebroaderCHIcommunity.Topicstobe discussedinc...
Matthew Kam, Susan M. Dray, Kentaro Toyama, Gary M...
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
14 years 3 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel
CNSM
2010
13 years 7 months ago
Rule-based SLA management for revenue maximisation in Cloud Computing Markets
This paper introduces several Business Rules for maximising the revenue of Providers in Cloud Computing Markets. These rules apply in both negotiation and execution time, and enfor...
Mario Macías, Josep Oriol Fitó, Jord...