Sciweavers

1147 search results - page 103 / 230
» Transformation of Access Rights
Sort
View
CCGRID
2005
IEEE
14 years 2 months ago
Experiences with the KOALA co-allocating scheduler in multiclusters
In multicluster systems, and more generally, in grids, jobs may require co-allocation, i.e., the simultaneous allocation of resources such as processors and input files in multip...
Hashim H. Mohamed, Dick H. J. Epema
EGC
2005
Springer
14 years 2 months ago
The Design and Implementation of the KOALA Co-allocating Grid Scheduler
In multicluster systems, and more generally, in grids, jobs may require co-allocation, i.e., the simultaneous allocation of resources such as processors and input files in multipl...
Hashim H. Mohamed, Dick H. J. Epema
PDCAT
2005
Springer
14 years 2 months ago
Authentication with controlled anonymity in P2P systems
This paper describes a new protocol for authentication in Peer-to-Peer systems. The protocol has been designed to meet specialized requirements of P2P systems, such as lack of dir...
Adam Wierzbicki, Aneta Zwierko, Zbigniew Kotulski
STACS
2005
Springer
14 years 2 months ago
Information Theory in Property Testing and Monotonicity Testing in Higher Dimension
In property testing, we are given oracle access to a function f, and we wish to test if the function satisfies a given property P, or it is ε-far from having that property. In a...
Nir Ailon, Bernard Chazelle
INEX
2004
Springer
14 years 2 months ago
NEXI, Now and Next
NEXI was introduced in INEX 2004 as a query language for specifying structured and unstructured queries on XML documents. A language expressive enough for INEX yet simple enough f...
Andrew Trotman, Börkur Sigurbjörnsson