Sciweavers

8655 search results - page 321 / 1731
» Challenges for Trusted Computing
Sort
View
117
Voted
CCS
2009
ACM
15 years 10 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
137
Voted
CLUSTER
2009
IEEE
15 years 10 months ago
Topics on measuring real power usage on high performance computing platforms
—Power has recently been recognized as one of the major obstacles in fielding a Peta-FLOPs class system. To reach Exa-FLOPs, the challenge will certainly be compounded. In this ...
James H. Laros, Kevin T. Pedretti, Suzanne M. Kell...
EUROPAR
2009
Springer
15 years 10 months ago
A Multilevel Parallelization Framework for High-Order Stencil Computations
Stencil based computation on structured grids is a common kernel to broad scientific applications. The order of stencils increases with the required precision, and it is a challeng...
Hikmet Dursun, Ken-ichi Nomura, Liu Peng, Richard ...
HPDC
2008
IEEE
15 years 10 months ago
DataLab: transactional data-parallel computing on an active storage cloud
Active storage clouds are an attractive platform for executing large data intensive workloads found in many fields of science. However, active storage presents new system managem...
Brandon Rich, Douglas Thain
CCGRID
2007
IEEE
15 years 10 months ago
Impact of Adaptive Resource Allocation Requests in Utility Cluster Computing Environments
Maximizing resource provider profit and satisfying user requirements at the same time is a challenging problem in utility computing environments. In this paper, we introduce adap...
Marco Aurélio Stelmar Netto, Rajkumar Buyya