Sciweavers

8655 search results - page 137 / 1731
» Challenges for Trusted Computing
Sort
View
CLUSTER
2007
IEEE
15 years 4 months ago
The challenges and rewards of petascale clusters
-Jul 2 - Santa Clara Conv Ctr - abstracts by 4/30 Asilomar Conference on Signals, Systems, and Computers due by June 1 [more] - Nov 1-4, 2009 - Asilomar Conf Grounds, Pacific Grove...
Mark Seager
IPPS
2007
IEEE
15 years 4 months ago
Challenges in Mapping Graph Exploration Algorithms on Advanced Multi-core Processors
Multi-core processors are a shift of paradigm in computer architecture that promises a dramatic increase in performance. But multi-core processors also bring an unprecedented leve...
Oreste Villa, Daniele Paolo Scarpazza, Fabrizio Pe...
IJCAI
2003
14 years 11 months ago
Modeling Web Navigation: Methods and Challenges
A computational cognitive model of Web navigation is a working computer system that simulates human users searching for items in a Web site. A fully working model must automate asp...
Craig S. Miller
CHI
2011
ACM
14 years 1 months ago
Social and technical challenges in parenting teens' social media use
With millions of teenagers on the Internet, millions of parents are trying to understand what their teens are doing and why. Understanding how technology use impacts teens‘ lear...
Sarita Yardi, Amy Bruckman
ACSAC
1999
IEEE
15 years 2 months ago
Safe Areas of Computation for Secure Computing with Insecure Applications
Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
André L. M. dos Santos, Richard A. Kemmerer