Sciweavers

631 search results - page 61 / 127
» Wide-Area Computing: Resource Sharing on a Large Scale
Sort
View
FC
2010
Springer
171views Cryptology» more  FC 2010»
13 years 11 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
CLUSTER
2005
IEEE
14 years 1 months ago
VioCluster: Virtualization for Dynamic Computational Domains
A large organization, such as a university, commonly supplies computational power through multiple independently administered computational domains (e.g. clusters). Each computati...
Paul Ruth, P. McGachey, Dongyan Xu
SOSP
2009
ACM
14 years 4 months ago
Fabric: a platform for secure distributed computation and storage
Fabric is a new system and language for building secure distributed information systems. It is a decentralized system that allows heterogeneous network nodes to securely share bot...
Jed Liu, Michael D. George, K. Vikram, Xin Qi, Luc...
ATAL
2005
Springer
14 years 1 months ago
An integrated token-based algorithm for scalable coordination
Efficient coordination among large numbers of heterogeneous agents promises to revolutionize the way in which some complex tasks, such as responding to urban disasters can be perf...
Yang Xu, Paul Scerri, Bin Yu, Steven Okamoto, Mich...
CCGRID
2006
IEEE
14 years 1 months ago
Learning-Based Negotiation Strategies for Grid Scheduling
One of the key requirement for Grid infrastructures is the ability to share resources with nontrivial qualities of service. However, resource management in a decentralized infrast...
Jiadao Li, Ramin Yahyapour