Sciweavers

1286 search results - page 162 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
HPDC
1998
IEEE
15 years 5 months ago
Authorization for Metacomputing Applications
One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved ...
G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman
106
Voted
PPOPP
1997
ACM
15 years 4 months ago
LoPC: Modeling Contention in Parallel Algorithms
Parallel algorithm designers need computational models that take first order system costs into account, but are also simple enough to use in practice. This paper introduces the L...
Matthew Frank, Anant Agarwal, Mary K. Vernon
EGC
2005
Springer
15 years 6 months ago
Experiences of Applying Advanced Grid Authorisation Infrastructures
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured that the security mechanisms needed to support Grid based collaborations are at l...
Richard O. Sinnott, A. J. Stell, David W. Chadwick...
119
Voted
IPPS
2010
IEEE
14 years 10 months ago
Performance modeling of heterogeneous systems
Predicting how well applications may run on modern systems is becoming increasingly challenging. It is no longer sufficient to look at number of floating point operations and commu...
Jan Christian Meyer, Anne C. Elster
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 4 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena