Sciweavers

177 search results - page 36 / 36
» Access Control Based on Execution History
Sort
View
IJHPCA
2007
114views more  IJHPCA 2007»
15 years 4 months ago
An Approach To Data Distributions in Chapel
A key characteristic of today’s high performance computing systems is a physically distributed memory, which makes the efficient management of locality essential for taking adv...
R. E. Diaconescu, Hans P. Zima
161
Voted
DRM
2007
Springer
15 years 11 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen