Sciweavers

468 search results - page 76 / 94
» Cryptographic and Computational Challenges in Grid Computing
Sort
View
107
Voted
FGCS
2006
91views more  FGCS 2006»
15 years 1 months ago
Dynamic provisioning of LightPath services for radio astronomy applications
A demonstration at iGRID 2005 used dynamic, deterministic, and dedicated LightPath network services to link radio telescopes from around the world with computational facilities at...
Jerry Sobieski, Tom Lehman, Bijan Jabbari, Chester...
82
Voted
ICCSA
2005
Springer
15 years 7 months ago
Ascent Phase Trajectory Optimization for a Hypersonic Vehicle Using Nonlinear Programming
In this paper we present a nonlinear programming solution to one of the most challenging problems in trajectory optimization. Unlike most aerospace trajectory optimization problems...
H. M. Prasanna, D. Ghose, M. S. Bhat, Chiranjib Bh...
LCPC
2005
Springer
15 years 7 months ago
Code Transformations for One-Pass Analysis
With the growing popularity of streaming data model, processing queries over streaming data has become an important topic. Streaming data has received attention in a number of comm...
Xiaogang Li, Gagan Agrawal
VLSID
2006
IEEE
142views VLSI» more  VLSID 2006»
16 years 2 months ago
Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors
- Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, ...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
124
Voted
EUROCRYPT
2009
Springer
16 years 2 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...