Cluster computing

Saturday, January 31, 2015

›
Today we continue our discussion on the detector distribution algorithm. If there are N intelligent disks, then they are clustered into k  ...
Friday, January 30, 2015

›
Today we continue our discussion on Two layered access control in Storage Area Networks. We mentioned the matching rule used in mature dete...
Thursday, January 29, 2015

›
Today we continue to discuss the paper Two layered access control for Storage Area Network by Tao, DeJiao, ShiGuang. In this paper they des...
Wednesday, January 28, 2015

›
Today we continue our discussion on Access Control. We were reviewing RBAC models specifically  IRBAC2000 model. We now review MDRBAC model...
Tuesday, January 27, 2015

›
#codingexercise Double GetAlternateEvenNumberRangecubeRtProductSquares()(Double [] A) { if (A == null) return 0; Return A.AlternateEve...
Monday, January 26, 2015

›
Today we continue discussing RBAC model. We discussed that it could implement both DAC and MAC. It is based on the premise of roles. User m...
Sunday, January 25, 2015

›
We continue our reading on the Study of Access Control Model in Information Security by Qing-Hai,Ying et al. Today we review the mention fo...
‹
›
Home
View web version

About Me

My photo
Ravi Rajamani
View my complete profile
Powered by Blogger.