Sciweavers

3801 search results - page 681 / 761
» An Approach to Modeling Software Safety
Sort
View
ESORICS
2010
Springer
14 years 11 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
CONSTRAINTS
2008
95views more  CONSTRAINTS 2008»
14 years 10 months ago
Efficient Sequence Alignment with Side-Constraints by Cluster Tree Elimination
Aligning DNA and protein sequences is a core technique in molecular biology. Often, it is desirable to include partial prior knowledge and conditions in an alignment. Going beyond...
Sebastian Will, Anke Busch, Rolf Backofen
COMPUTER
2006
98views more  COMPUTER 2006»
14 years 9 months ago
Energy-Aware User Interfaces and Energy-Adaptive Displays
The utility of a mobile computer, such as a handheld or a laptop, is largely constrained by battery life. The display stands out as a major consumer of battery energy, so reducing...
Parthasarathy Ranganathan, Erik Geelhoed, Meera Ma...
GRID
2006
Springer
14 years 9 months ago
Simultaneous Scheduling of Replication and Computation for Data-Intensive Applications on the Grid
One of the first motivations of using grids comes from applications managing large data sets in field such as high energy physics or life sciences. To improve the global throughput...
Frederic Desprez, Antoine Vernois
SIAMSC
2011
148views more  SIAMSC 2011»
14 years 4 months ago
Bootstrap AMG
We develop an algebraic multigrid (AMG) setup scheme based on the bootstrap framework for multiscale scientific computation. Our approach uses a weighted least squares definition...
Achi Brandt, James J. Brannick, K. Kahl, Irene Liv...