Sciweavers

24529 search results - page 273 / 4906
» Computing on Authenticated Data
Sort
View
150
Voted
SPW
2000
Springer
15 years 7 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano
VIS
2008
IEEE
134views Visualization» more  VIS 2008»
16 years 5 months ago
A Practical Approach to Morse-Smale Complex Computation: Scalability and Generality
The Morse-Smale (MS) complex has proven to be a useful tool in extracting and visualizing features from scalar-valued data. However, efficient computation of the MS complex for lar...
Attila Gyulassy, Peer-Timo Bremer, Bernd Hamann,...
AP2PC
2007
Springer
15 years 5 months ago
Enabling Grassroots Distributed Computing with CompTorrent
This paper describes the operational characteristics of “CompTorrent”, a general purpose distributed computing platform that provides a low entry cost to creating new distribut...
Bradley Goldsmith
IPPS
1996
IEEE
15 years 8 months ago
Commutativity Analysis: A Technique for Automatically Parallelizing Pointer-Based Computations
This paper introduces an analysis technique, commutativity analysis, for automatically parallelizing computations that manipulate dynamic, pointer-based data structures. Commutati...
Martin C. Rinard, Pedro C. Diniz
BMCBI
2002
134views more  BMCBI 2002»
15 years 3 months ago
CoreGenes: A computational tool for identifying and cataloging "core" genes in a set of small genomes
Background: Improvements in DNA sequencing technology and methodology have led to the rapid expansion of databases comprising DNA sequence, gene and genome data. Lower operational...
Nikhat Zafar, Raja Mazumder, Donald Seto