Sciweavers

24529 search results - page 419 / 4906
» Computing on Authenticated Data
Sort
View
CORR
2008
Springer
92views Education» more  CORR 2008»
15 years 4 months ago
Accelerating Large-scale Data Exploration through Data Diffusion
Data-intensive applications often require exploratory analysis of large datasets. If analysis is performed on distributed resources, data locality can be crucial to high throughpu...
Ioan Raicu, Yong Zhao, Ian T. Foster, Alexander S....
PERCOM
2008
ACM
16 years 4 months ago
Data-centric middleware for context-aware pervasive computing
The complexity of developing and deploying context-aware pervasive-computing applications calls for distributed software infrastructures that assist applications to collect, aggre...
Guanling Chen, Ming Li, David Kotz
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 11 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...
SGAI
2009
Springer
15 years 11 months ago
From Source Code to Runtime Behaviour: Software Metrics Help to Select the Computer Architecture
The decision which hardware platform to use for a certain application is an important problem in computer architecture. This paper reports on a study where a data-mining approach i...
Frank Eichinger, David Kramer, Klemens Böhm, ...
HICSS
2007
IEEE
85views Biometrics» more  HICSS 2007»
15 years 11 months ago
Leveraging Computational Grid Technologies for Building a Secure and Manageable Power Grid
The US Power Industry is in the process of overhauling the Power Grid to make it more secure, reliable, and available. The IT systems that comprise a major part of this change nee...
Himanshu Khurana, Mohammad Maifi Hasan Khan, Von W...