Sciweavers

757 search results - page 151 / 152
» Composing Security-Aware Software
Sort
View
RTS
2008
119views more  RTS 2008»
13 years 5 months ago
Symbolic quality control for multimedia applications
We present a fine grain quality control method for multimedia applications. The method takes as input an application software composed of actions. The execution times of actions a...
Jacques Combaz, Jean-Claude Fernandez, Joseph Sifa...
FGCS
2010
186views more  FGCS 2010»
13 years 4 months ago
A grid portal for solving geoscience problems using distributed knowledge discovery services
This paper describes our research effort to employ Grid technologies to enable the development of geoscience applications by integrating workflow technologies with data mining r...
Gianluigi Folino, Agostino Forestiero, Giuseppe Pa...
ICPADS
2010
IEEE
13 years 4 months ago
Data-Aware Task Scheduling on Multi-accelerator Based Platforms
To fully tap into the potential of heterogeneous machines composed of multicore processors and multiple accelerators, simple offloading approaches in which the main trunk of the ap...
Cédric Augonnet, Jérôme Clet-O...
CCS
2010
ACM
13 years 2 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
BMCBI
2011
13 years 1 months ago
Bio: : Phylo - phyloinformatic analysis using Perl
Background: Phyloinformatic analyses involve large amounts of data and metadata of complex structure. Collecting, processing, analyzing, visualizing and summarizing these data and...
Rutger A. Vos, Jason Caravas, Klaas Hartmann, Mark...