Sciweavers

8655 search results - page 315 / 1731
» Challenges for Trusted Computing
Sort
View
ICICS
2009
Springer
15 years 10 months ago
Secure Remote Execution of Sequential Computations
Abstract. We describe a scheme that secures the remote execution of sequential computations in grid-computing scenarios. To the best of our knowledge, this is the first contributi...
Ghassan Karame, Mario Strasser, Srdjan Capkun
124
Voted
ICAIL
2009
ACM
15 years 10 months ago
Human-aided computer cognition for e-discovery
Throughout its history, AI researchers have alternatively seen their mission as producing computer behavior that is indistinguishable from that of humans or as providing computati...
Christopher Hogan, Robert Bauer, Dan Brassil
158
Voted
CCS
2010
ACM
15 years 10 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
103
Voted
IPPS
2007
IEEE
15 years 9 months ago
A Comparison of Dag-Scheduling Strategies for Internet-Based Computing
A fundamental challenge in Internet computing (IC) is to efficiently schedule computations having complex interjob dependencies, given the unpredictability of remote machines, in...
Robert Hall, Arnold L. Rosenberg, Arun Venkatarama...
147
Voted
IPPS
2007
IEEE
15 years 9 months ago
Analysis of a Computational Biology Simulation Technique on Emerging Processing Architectures
1 Multi-paradigm, multi-threaded and multi-core computing devices available today provide several orders of magnitude performance improvement over mainstream microprocessors. These...
Jeremy S. Meredith, Sadaf R. Alam, Jeffrey S. Vett...