Sciweavers

837 search results - page 70 / 168
» Tools for domain-based policy management of distributed syst...
Sort
View
IPPS
2000
IEEE
14 years 9 days ago
A Requirements Analysis for Parallel KDD Systems
Abstract. The current generation of data mining tools have limited capacity and performance, since these tools tend to be sequential. This paper explores a migration path out of th...
William Maniatty, Mohammed Javeed Zaki
CEC
2007
IEEE
14 years 2 months ago
Evolutionary optimization of parameters for distributed virtual environments
—In a distributed virtual environment interest management schemes attempt to ensure virtual world objects exchange messages only if they are interacting. This provides an opportu...
Simon E. Parkin, Peter Andras, Graham Morgan
GRID
2006
Springer
13 years 8 months ago
Cacheable Decentralized Groups for Grid Resource Access Control
Abstract-- Sharing data among collaborators in widely distributed systems remains a challenge due to limitations with existing methods for defining groups across administrative dom...
Jeffrey Hemmes, Douglas Thain
CHIMIT
2007
ACM
13 years 12 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
CCS
2007
ACM
14 years 2 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...