Sciweavers

8655 search results - page 450 / 1731
» Challenges for Trusted Computing
Sort
View
IPPS
2007
IEEE
15 years 10 months ago
Experimental Evaluation of Emerging Multi-core Architectures
The trend of increasing speed and complexity in the single-core processor as stated in the Moore’s law is facing practical challenges. As a result, the multi-core processor arch...
Abdullah Kayi, Yiyi Yao, Tarek A. El-Ghazawi, Greg...
LICS
2007
IEEE
15 years 10 months ago
A Complete Axiomatization of Knowledge and Cryptography
The combination of first-order epistemic logic and formal cryptography offers a potentially very powerful framework for security protocol verification. In this article, we addre...
Mika Cohen, Mads Dam
EUROPAR
2007
Springer
15 years 10 months ago
Experiences Understanding Performance in a Commercial Scale-Out Environment
Abstract. Clusters of loosely connected machines are becoming an important model for commercial computing. The cost/performance ratio makes these scale-out solutions an attractive ...
Robert W. Wisniewski, Reza Azimi, Mathieu Desnoyer...
CEC
2005
IEEE
15 years 10 months ago
Multiobjective financial portfolio design: a hybrid evolutionary approach
—A principal challenge in modern computational finance is efficient portfolio design – portfolio optimization followed by decision-making. Optimization based on even the widely...
Raj Subbu, Piero P. Bonissone, Neil Eklund, Sriniv...
CA
2002
IEEE
15 years 9 months ago
Evaluating Video-Based Motion Capture
Motion capture can be an effective method of creating realistic human motion for animation. Unfortunately, the quality demands for animation place challenging demands on a capture...
Michael Gleicher, Nicola J. Ferrier