Sciweavers

1266 search results - page 205 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
GRID
2006
Springer
13 years 8 months ago
A Decentralized Computational Infrastructure for Grid-Based Parallel Asynchronous Iterative Applications
Abstract Parallel asynchronous iterative algorithms relax synchronization and communication requirements, and can potentially extend Desktop Grids beyond embarrassingly parallel ap...
Zhen Li, Manish Parashar
CLUSTER
2004
IEEE
14 years 7 days ago
An efficient end-host architecture for cluster communication
Cluster computing environments built from commodity hardware have provided a cost-effective solution for many scientific and high-performance applications. Likewise, middleware te...
Xin Qi, Gabriel Parmer, Richard West
PERCOM
2005
ACM
14 years 8 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
NCA
2009
IEEE
14 years 3 months ago
QuoCast: A Resource-Aware Algorithm for Reliable Peer-to-Peer Multicast
—This paper presents QuoCast, a resource-aware protocol for reliable stream diffusion in unreliable environments, where processes may crash and communication links may lose messa...
Mouna Allani, Benoît Garbinato, Amirhossein ...
ICAC
2006
IEEE
14 years 2 months ago
Enabling Self-Managing Applications using Model-based Online Control Strategies
— The increasing heterogeneity, dynamism, and uncertainty of emerging DCE (Distributed Computing Environment) systems imply that an application must be able to detect and adapt t...
Viraj Bhat, Manish Parashar, Hua Liu, Mohit Khande...